General

  • Target

    2024-02-19_d900c60855cd0e21d8a3398c19d2cd32_cryptolocker

  • Size

    31KB

  • MD5

    d900c60855cd0e21d8a3398c19d2cd32

  • SHA1

    235c79a01f803a28d94534be9484c3825f3d56a8

  • SHA256

    cff4ff8ae603e8f00bf854b6d495b99d856d9753736077d5f399d8041a52863a

  • SHA512

    cd2aa9beeb63458d449ed1a8bb2ac45c95c87d56eccdf50c72bcb5d280de0a06a0f1eec1492694f6d9e9b9872ca9384f7d8d6d504f9c348c51af04b2d6b6607a

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tH3Mq:q0zizzOSxMOtEvwDpj/arq1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_d900c60855cd0e21d8a3398c19d2cd32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections