General

  • Target

    2024-02-22_ff90c8a593195dd2fa72caf33d8d0cf4_cryptolocker

  • Size

    34KB

  • MD5

    ff90c8a593195dd2fa72caf33d8d0cf4

  • SHA1

    fafd0dfeca68c64ea6d6f5f944607d36a09c461d

  • SHA256

    1843f510ed31b66914478731b245f9f9fc910fd1ba642a0b565c48ca5931da00

  • SHA512

    fd386bd176925a3bd530b3ab90259c2adc47508dc96eca85001ddc99fdc4bc0e29c802a2a8d13bfc8193a0c6dd37d404448c337b503a20829b2a85ac23f1c8a6

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoW+:qmbhXDmjr5MOtEvwDpj5cDx

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_ff90c8a593195dd2fa72caf33d8d0cf4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections