General

  • Target

    2024-02-22_e733a755fd0fbecc86a44e0e7b929a0a_cryptolocker

  • Size

    48KB

  • MD5

    e733a755fd0fbecc86a44e0e7b929a0a

  • SHA1

    e450beb509180d4967dc899c0c6924902045b69c

  • SHA256

    fa4b9f02429e23cdd15c9d33fbf2dc9020286f1acaec45c7415b3f76668fd093

  • SHA512

    60bd4c5d94039df5834940ab903573f648f75e117077f61538009281480caf9c1c279603a0273b15ece4ef1e44cb5cda3e95e126add7ab904d807a98b3c55e50

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zH:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6ur

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_e733a755fd0fbecc86a44e0e7b929a0a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections