General

  • Target

    2024-02-19_e2f7551f5306e429232bec0cd2329f78_cryptolocker

  • Size

    61KB

  • MD5

    e2f7551f5306e429232bec0cd2329f78

  • SHA1

    5fbf38cd6825b118d6193d92cdef005fc52b226f

  • SHA256

    5b26585c137fea9793705bb76360a8a316081643a4ef8655dfc33f63f4b2f586

  • SHA512

    1fe0bd9d4c229b37f6aa0da39e617d3e568671d64274e686809c797e8bfebf7f7a07a0943f91718d8ebb2a84f33b8d0f9c7b7b4c4c0595d017bbd4af59475b30

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPH:BbdDmjr+OtEvwDpjM8i

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_e2f7551f5306e429232bec0cd2329f78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections