General

  • Target

    2024-02-22_14a691db4e7e2b9eead29293e50e9668_cryptolocker

  • Size

    25KB

  • MD5

    14a691db4e7e2b9eead29293e50e9668

  • SHA1

    25bf5f7fe32379de9aadfc7bfcfc2deee05662d9

  • SHA256

    c8fce6ba88e13358b89eb867f0fe7e8425d374476513e53167fa1f3d0965e08c

  • SHA512

    dd0bc6982c92636ae9569b1b34801ecb94650afd9c18d6cd1f153ee92299d31e188565cce443772ab525554f35e2aa67ad0117829f90365d4c7d5bcdadfecdd1

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOg:q0ZziOWwULueOSdE8tOOtEvwDpje2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_14a691db4e7e2b9eead29293e50e9668_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections