General

  • Target

    2024-02-12_e4f5346760857dd72e5ebb56f275f971_cryptolocker

  • Size

    50KB

  • MD5

    e4f5346760857dd72e5ebb56f275f971

  • SHA1

    74fa8c8bad1f9240c2255e87dfe13b9a62d4f8a0

  • SHA256

    9a607b24e56484b1870e04582bb122ceef02c8d87d391c5d66ee6205dddcd616

  • SHA512

    2f0febcdfa575b6065bceda16a13b7f88b05b37d7d748b9dd4ffb1d5cd8aa8d1dc2b86b46dae7e7b9d822cb529ddd9177e8d6f938815a3e752b8b8485053a940

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy4:BbdDmjr+OtEvwDpjML

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_e4f5346760857dd72e5ebb56f275f971_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections