General

  • Target

    2024-02-04_e4b5c3e5c11553f444db48a97c8e1a64_cryptolocker

  • Size

    46KB

  • MD5

    e4b5c3e5c11553f444db48a97c8e1a64

  • SHA1

    d3f015e48dd3b3e95d8900f398fb780b0d688c07

  • SHA256

    080ab66b4b7d8254dbed6206a3f14bf969f215246756ce139c1af2c31cec6bec

  • SHA512

    75d0754404e385df839d35fa2d08e482097bc130e29b9de56e1cee13c92615c3fb1f6bbde9ca967afaab7b73e7cfc2bef3ef30e8337187bad1bd720987643388

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22U:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_e4b5c3e5c11553f444db48a97c8e1a64_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections