General

  • Target

    2024-02-13_e6f6d257708bcf728e2cc71b780f6fb8_cryptolocker

  • Size

    57KB

  • MD5

    e6f6d257708bcf728e2cc71b780f6fb8

  • SHA1

    ff8f217f0cb8c51924bce36f13b0ef45882515a0

  • SHA256

    50d50c82f46570ba8c2e76e370fa9f0f18275dd512c46d7ac45b18c65d30eed6

  • SHA512

    a65fb46f57a5abbfbf683f264752d5326de3ee92f5e3fe84babfe344af95410890a89bfbe648a50b0e58de2edf0bffebf7dded9237dfd331fde80f3d2ee998b4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61PTh:BbdDmjr+OtEvwDpjMz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_e6f6d257708bcf728e2cc71b780f6fb8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections