General

  • Target

    2024-02-19_2e1dc5223436b38ee8581494c8dcbff7_cryptolocker

  • Size

    29KB

  • MD5

    2e1dc5223436b38ee8581494c8dcbff7

  • SHA1

    77ffe6787e5e839a6ec263da52ce11392dee8307

  • SHA256

    557653305e366a9af46790d1d7d44a704ff0fa5bf546e8f377a4d7cf033b3aa6

  • SHA512

    2bd37c48ed28a136b0c0066a94c5562796ccbf72d373baa7d0ff4fc2408ba66114c3195c64bee82195c0cf0b16ad4edd0b1b8900d1b1815926c5563748432fed

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+pi:q0zizzOSxMOtEvwDpj/arq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_2e1dc5223436b38ee8581494c8dcbff7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections