General

  • Target

    2024-01-23_e7491118edca4b4d5e6d5ff0d9a9c50f_cryptolocker

  • Size

    59KB

  • MD5

    e7491118edca4b4d5e6d5ff0d9a9c50f

  • SHA1

    ebe4a0397c6e15aadd7ee371cfff6fb1b0123e6b

  • SHA256

    ca3f234b98ddda7894e7791f5beb0aa8159f01d6d2d380b5e3b44c36659ae949

  • SHA512

    416f2c3ef07ede77a5cc7d61c35f3cf323d3d66a126cba5a362255f3ac8556d0c8977e5b6e3cb5384f86c5def0c6c153fdd52e2ad0ff7431aa6421f27d6ac65e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsw:BbdDmjr+OtEvwDpjM8I

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_e7491118edca4b4d5e6d5ff0d9a9c50f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections