General

  • Target

    2024-02-23_0eb2c43a1a25495aa26b2a6b4eff0a00_cryptolocker

  • Size

    49KB

  • MD5

    0eb2c43a1a25495aa26b2a6b4eff0a00

  • SHA1

    650938cd8e7524b8c8b1ab5fdb37faef2a91fad8

  • SHA256

    8bdf7265ace48de664d131cf2943011fb4ab59d5df71ed42a697c6a32f97fef6

  • SHA512

    30faed418f6d3785a120666fc3656ac80483981fc2b4ec858b48ee2d25037762e3ef69616a7ebb4c5f652c20bbafbdd839e4abccd23b27fcaf8609ad22d38c0c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvJ:BbdDmjr+OtEvwDpjMXY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0eb2c43a1a25495aa26b2a6b4eff0a00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections