General

  • Target

    2024-01-18_eefe9045f2d81a68ed50fb4ca371139f_cryptolocker

  • Size

    60KB

  • MD5

    eefe9045f2d81a68ed50fb4ca371139f

  • SHA1

    2d52e450dcdeb5c447c2b5d81b1df18cfd353d11

  • SHA256

    45537c7d8c1b13e783b2b38ba1b12391295fb769816c38bc7c860e94ebb73620

  • SHA512

    ba087535712a6e59ec870fc807e2146cfbe33554a3295ad5e0643b60811cc64631f0211f0c7cc94092c195f7c3c70863d2928b839f716a931c8da44039a46713

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsR:BbdDmjr+OtEvwDpjM8Z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_eefe9045f2d81a68ed50fb4ca371139f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections