General

  • Target

    2024-02-01_e84cb3fa30c62d7674aa1ee0ae221a22_cryptolocker

  • Size

    29KB

  • MD5

    e84cb3fa30c62d7674aa1ee0ae221a22

  • SHA1

    c6098ee6f5bdba759c781f55e59c26fcd2a4e95d

  • SHA256

    be03b76dc8ae0dfbd274af599654d329480a08422391725a6f09d0f5b895df09

  • SHA512

    d99bc8c4b4a06238ea0ea60f9ba74189fdd665a62a7a24527383ed079216726507afb4f4dce509112bff5e847d21a4495725b1e6ec7fac7a07f34efdc2f70cf4

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xTD:q0zizzOSxMOtEvwDpj/ar5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_e84cb3fa30c62d7674aa1ee0ae221a22_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections