General

  • Target

    2024-02-20_e8fb0b014114c32f5fa9c455a893f98b_cryptolocker

  • Size

    56KB

  • MD5

    e8fb0b014114c32f5fa9c455a893f98b

  • SHA1

    cff09f9cb7d9753f1040dffa0e1fc9559c40dc72

  • SHA256

    c782e325f71c5395626113a6c755ce21224ab83d4584c871efae1a56d6e71f14

  • SHA512

    c52250f5ded732ca7e7dd5b9a08bbc7f05b7366e9e1bc2ca3a9f4fe9497e329808bf026a328f4e729925bde70873efe31eb2f955acbcbe8844966fa35c42201f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61K:BbdDmjr+OtEvwDpjM4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_e8fb0b014114c32f5fa9c455a893f98b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections