General

  • Target

    2024-02-22_4af6362121359155b9af5bf67d40fc54_cryptolocker

  • Size

    31KB

  • MD5

    4af6362121359155b9af5bf67d40fc54

  • SHA1

    c86e6c5c081c939cdbbce3009ac40504ad8ad618

  • SHA256

    3ffe92ce9ce76bf2088f93bebe20922970aaaf27d7e4f69bb0d1b5ed55b34206

  • SHA512

    3bad447c75aa03b05482916b928b1143253a5770d438e9284af233654b37652735a13b3eaf775ed4c039be6ee61271a33b8e6379ace9a1740e135f80b5b6dd4c

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHh:q0zizzOSxMOtEvwDpj/arqB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_4af6362121359155b9af5bf67d40fc54_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections