General

  • Target

    2024-02-22_095474d86d1c418f19bbdcdd168b1e7f_cryptolocker

  • Size

    31KB

  • MD5

    095474d86d1c418f19bbdcdd168b1e7f

  • SHA1

    cc60eac08a29898c7c0a1d91ea955115fd2ffa74

  • SHA256

    516673b2e91d4792b210c1013cbfe3fcc5f04a63043c412a2eb6ddb63824e319

  • SHA512

    f279b4622239df7af3ced8f973eb4754be708a192455c5722087cadda4f896f603be9852d67bf9e2f43d1ad162adca79292b258d2e98f3299bc545c77bf9e199

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHs:q0zizzOSxMOtEvwDpj/ar1s

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_095474d86d1c418f19bbdcdd168b1e7f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections