General

  • Target

    2024-01-18_e1e6f686ce867731797f0af872ec762f_cryptolocker

  • Size

    44KB

  • MD5

    e1e6f686ce867731797f0af872ec762f

  • SHA1

    a430e80b09d896e08577ecd4245c75e36191c33f

  • SHA256

    4f7cf1e8cd86274d5dd0db27d81769514cb9933e961516d478c50dd135b510fb

  • SHA512

    41c8025a514064460007cec67d342b1262aa6b2b262427351602d65d182aae52fd947d284998a8e7f70508867db29f904a2ad894602f34d188f1bbfd6799078e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoK:qmbhXDmjr5MOtEvwDpj5cDtKkQZQw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_e1e6f686ce867731797f0af872ec762f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections