General

  • Target

    2024-02-22_e1f5f7bcd40f178e00c6bdef26599275_cryptolocker

  • Size

    34KB

  • MD5

    e1f5f7bcd40f178e00c6bdef26599275

  • SHA1

    7f1ad391a591dffd4179cc880dffa7e30cfb7bc9

  • SHA256

    2326e3b13d4e574bf05a34d9e26c251e4adacdc9808e5b3c976e438844b0dfec

  • SHA512

    d2cfb415008bc77e060f202b9987b9c4382198ab202bbb493c862a702f232e609e27e5bbf41e9def6777b2c06a89a70ecac5b4e3a222d41e57f8fae9cf57738b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoWq:qmbhXDmjr5MOtEvwDpj5cD1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_e1f5f7bcd40f178e00c6bdef26599275_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections