General

  • Target

    2024-02-13_e18894bfa32013fd68b536eab0a68662_cryptolocker

  • Size

    49KB

  • MD5

    e18894bfa32013fd68b536eab0a68662

  • SHA1

    d5ab927397e2875f5218b9296fd93536dbecde9f

  • SHA256

    eb8b2077d3795d4be824d5dd4e8cdbc49a4ea58c57347e5b01897224af1457fa

  • SHA512

    121ef860bafff5409e213bf47f482956e58f9d299cdbc9d14b96fda6bc1f3aa87a06c3f83c92ca9009d8c4f33d94b4bfe1f65ad90722033b46cb4f266a53450d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Lv6S:BbdDmjr+OtEvwDpjMZ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_e18894bfa32013fd68b536eab0a68662_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections