General

  • Target

    2024-02-19_e5eefcd2f5a31751ac83a5efc961b610_cryptolocker

  • Size

    45KB

  • MD5

    e5eefcd2f5a31751ac83a5efc961b610

  • SHA1

    a57bbfcb89eca20df21cf031ce6980fc898f4733

  • SHA256

    274fc09148a38e6c17cdb008814f005fc51135d71c44cefe0d44af55a18a421a

  • SHA512

    f1a1845aea92fd398c7a618deb9bd476070e7adbeb250c42a39de2a5519e8d5ae4973329c89ac1621615781a02f44ffdfb1a5884e20cdf8660d388f2e66e3d6f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mon:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_e5eefcd2f5a31751ac83a5efc961b610_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections