General

  • Target

    2024-02-13_ea9a36105c65ac5e4fb0a11f00c264df_cryptolocker

  • Size

    31KB

  • MD5

    ea9a36105c65ac5e4fb0a11f00c264df

  • SHA1

    77d600d8f65862a0bbdde753195a9e97ba50ed41

  • SHA256

    2feeba6b5c69502835dcdeb0ad3b96043ed5c7ab2e2aaa09c8370795f41c0494

  • SHA512

    5be1a4fe839d9be845e2a6609a9ac6fd8cc0ab9b10e2dbb1ef0d955c6f43cb70db8e13c2e2afa86447ec3b5e7cd8e4f7807298c49c003f1fd3f5cac80709a8e7

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNb:q0zizzOSxMOtEvwDpj/arqcb

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_ea9a36105c65ac5e4fb0a11f00c264df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections