General

  • Target

    2024-02-12_e2fae5a9384ff52e74ac834df49b242c_cryptolocker

  • Size

    28KB

  • MD5

    e2fae5a9384ff52e74ac834df49b242c

  • SHA1

    63f14e974495e660c02e8d6dee999cad7f767b89

  • SHA256

    95de78e8601ed696a61160842335b7d706888429de5b0c8599a5b8011f54345e

  • SHA512

    c8146747a55ce2aab09b3a8eb46bf76e2307af2ff1eaa9f9f80ba0cf98904ac39993a49ff716605cf3c3fa42357d9b70ab8456f80bb822011ffe99ed73b7f6bc

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+p:q0zizzOSxMOtEvwDpj/ar/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_e2fae5a9384ff52e74ac834df49b242c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections