General

  • Target

    2024-02-21_0e70a1fba2edfa5c159268b8c1688b45_cryptolocker

  • Size

    56KB

  • MD5

    0e70a1fba2edfa5c159268b8c1688b45

  • SHA1

    d66c6f46b062ea7bd317a3cfb62cde3ce56a7940

  • SHA256

    6e95e22e650c3f00c25c935a6f79806ea8ff890a58fcc7226c09272c8c2284d4

  • SHA512

    2a928ccb1ddbac7877f4f28b593b147895f4640c9cfed7ab4bfb14c7ed6c84fe652445d7cd1ec59a7344b0c81ff771cb7ded407103f42475037c7be330adb4b6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb610:BbdDmjr+OtEvwDpjMe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_0e70a1fba2edfa5c159268b8c1688b45_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections