General

  • Target

    2024-02-14_e4bd6fd9fdc2e8f0a1be529c39c7abc0_cryptolocker

  • Size

    45KB

  • MD5

    e4bd6fd9fdc2e8f0a1be529c39c7abc0

  • SHA1

    dc50e7ffc9674a0fec1032eeabbf0cd3ba0688a6

  • SHA256

    dc55879724b17a216118b1ab9f6cb6750dff11b5331a5a4ccfb38f7ad17e2817

  • SHA512

    71b52b60067af5e15fee3f85283c0ab3ff5d61ed72ef952dc149cd3b6d08de1eb7a1656d83c6f49085a28ae2ec3c82284811fc7f0cc40b395c88e3a52051555f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoA:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_e4bd6fd9fdc2e8f0a1be529c39c7abc0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections