General

  • Target

    2024-02-18_fe36d642ab33139de45e1ad0fcf5c7a0_cryptolocker

  • Size

    61KB

  • MD5

    fe36d642ab33139de45e1ad0fcf5c7a0

  • SHA1

    915891df5656e7dc3a9beb32c088dff2c45df32b

  • SHA256

    8189a68f84c4b6b07f40993ab23f2a29b02e36898454a2581a4dfa7c139ee018

  • SHA512

    d5305ccc7b0791deb3ca093e4b9b1be16305671e927a6282e6ac6634dd00615dfc7dad7ad97b30ef0a35251d1a36869e030c3931b329d23dc0a97a10c4bb6521

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsk:BbdDmjr+OtEvwDpjM88

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_fe36d642ab33139de45e1ad0fcf5c7a0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections