General

  • Target

    2024-02-28_e6d210420ad813e5f105c67c55acd3f2_cryptolocker

  • Size

    55KB

  • MD5

    e6d210420ad813e5f105c67c55acd3f2

  • SHA1

    dbf654d02a9d6a5ab584978cf96e8500bedf3ffe

  • SHA256

    5fabd51a61831ca0b2e3c9f41935ecc4a24adee223428fe987a0e6711b5081cc

  • SHA512

    50182bf5fd48753eb15da76b82a47c5e4c8d61a771dbba88824ade7ead092a8702ae479848cca6a08fd59783355e0259f5e72515dbe99c827b336aef9e8c9dac

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61P:BbdDmjr+OtEvwDpjMp

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_e6d210420ad813e5f105c67c55acd3f2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections