General

  • Target

    2024-02-23_ec3a94e750f6b71bdc058b216b62598e_cryptolocker

  • Size

    50KB

  • MD5

    ec3a94e750f6b71bdc058b216b62598e

  • SHA1

    d64234ce9201251926d64bc805b66c13edd28940

  • SHA256

    8b861951ca082afcfac0b2d3bae132a7b67637f2b885532632f72e4a687a50f6

  • SHA512

    1650fcb91f0e1d41cbd969a7d9f35e82c43571d8edd54ecf18f5c891e35f510b93b146223eea68c1af0bd5ca407c0ccec3dedbe0f55c9ae210b017b66bfa355c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impgn0z:BbdDmjr+OtEvwDpjMd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_ec3a94e750f6b71bdc058b216b62598e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections