General

  • Target

    2024-02-22_902e6454952f4bbff71ac391155f787c_cryptolocker

  • Size

    25KB

  • MD5

    902e6454952f4bbff71ac391155f787c

  • SHA1

    1a3ac7f3dc3f87ecc576394be26e249e81459ce0

  • SHA256

    e282518af41098f061f0d0ddc76b9b6434638535cc3b71aa3877487baf78ddc3

  • SHA512

    22a910657d1d1c0f65008b7d15fb31ec0fe2f6fd4224f800d2b711cef96145b123810a589eae579208c2b5155b672b176effef21ac6cf847b41a770f913d614f

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxla:q0ZziOWwULueOSdE8tOOtEvwDpjeoa

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_902e6454952f4bbff71ac391155f787c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections