General

  • Target

    2024-02-20_eb4a702de974015415b2a541ff54fde4_cryptolocker

  • Size

    55KB

  • MD5

    eb4a702de974015415b2a541ff54fde4

  • SHA1

    f6def9151caeb53457366d0a04171ad0643262d6

  • SHA256

    7ef8005dcf050db4d1d239e541bf94a5de5fb2437122d471d890ff3e63bb037a

  • SHA512

    e65dca41bb2bdedd6ecd88b37a6893314d4192a61b0e39c3b516ab3e53f80e724d97b8112d774d41248b8331887f05d86fcf549dec41bbcabe51bc4bb25cebb6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xBo:BbdDmjr+OtEvwDpjM+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_eb4a702de974015415b2a541ff54fde4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections