General

  • Target

    2024-02-14_e289efc25429a5ed4e7e123c550ad55f_cryptolocker

  • Size

    48KB

  • MD5

    e289efc25429a5ed4e7e123c550ad55f

  • SHA1

    ca3c77cf883e9bc8b6fd7a7d289bac34093b08d1

  • SHA256

    76f5807d0d44bb47fe8dccb3156bce895fe50d9f3a2f2c395a7687e528db6828

  • SHA512

    8bb5f6727c00a7faa733ad9906fba4e65fabb3de725a89324ba3cf6db52458cb7262bb4f6b7db6dabdc5a110ab13c274d285e403e2a3343de1f9e34f7d4d560c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zb:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_e289efc25429a5ed4e7e123c550ad55f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections