General

  • Target

    2024-02-17_ea591b1b0b99c7ad5ba93d20d9df2ab7_cryptolocker

  • Size

    46KB

  • MD5

    ea591b1b0b99c7ad5ba93d20d9df2ab7

  • SHA1

    e78eb38f061e4bf4637245f09d8aacf4d2c95f85

  • SHA256

    22ffe51639e8f841ed56c7762efc311bea1e8138701d6f3b2088768614979189

  • SHA512

    32ac8dd7bb55eede8c1d368e8f40cc9d889452a720022acedb269e49e5cfdfe9e7df3805be2cf510eefcc5b83a6c4ae4debfe505d33e1bf5c07cbc499dcdbccb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB9:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ67

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_ea591b1b0b99c7ad5ba93d20d9df2ab7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections