General

  • Target

    2024-02-14_e7c91ede723b1e3ce8b1f38e70be5e3c_cryptolocker

  • Size

    59KB

  • MD5

    e7c91ede723b1e3ce8b1f38e70be5e3c

  • SHA1

    dfc2a1783af37b5a4a1d48c360881607d4764793

  • SHA256

    4b1dc068be4ddd887cabf0893865efd6efc5c9b19b87936e8eae8e1191069df3

  • SHA512

    13d36913700886cc1ee897443f356232335f303decf1485aaf1e6956ba049491dd4fb1d54553c0be23fde93d332ddd4bcdc5adce4cdfd22b7878650b58596a05

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614w:BbdDmjr+OtEvwDpjMD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_e7c91ede723b1e3ce8b1f38e70be5e3c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections