General

  • Target

    2024-02-24_0e8c59e75b26923433fca701651b3c0d_cryptolocker

  • Size

    49KB

  • MD5

    0e8c59e75b26923433fca701651b3c0d

  • SHA1

    f3bcb36a870f9ccbaaf219eed6c3b1fce1f2430c

  • SHA256

    a1a73ef4b881cc10f44ad71baeaf0c2f81f0f0db9556fb11e7e7d62408f307a2

  • SHA512

    6d65fd74335582afe9b89529d352089ba22caf4a3ffdd4521d5d67e9fb566f4fc78eede6193614490bec4d8333f6df7ce7ddf584351b381cf05e748fa4a30c9e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvMD:BbdDmjr+OtEvwDpjMXR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_0e8c59e75b26923433fca701651b3c0d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections