General

  • Target

    2024-02-22_592ffb306eaadad83ea858e29e56b78f_cryptolocker

  • Size

    25KB

  • MD5

    592ffb306eaadad83ea858e29e56b78f

  • SHA1

    776d9a47088e9935caeb5503016876ec4eb9d5a6

  • SHA256

    42818d99b6f71d4ae20466c9d13b3c32001f05a4e97bf3682ac02920ee2f7a03

  • SHA512

    0981aa90bf91f56a5b66289d4de1a4e7464546e38c1048d0b0160ff3e6e53ccf2347ec10f6cadfd848c1ef75433e5d6cc66117b6c7f81a22bdcf3c441a288063

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxK:q0ZziOWwULueOSdE8tOOtEvwDpjeJ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_592ffb306eaadad83ea858e29e56b78f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections