General

  • Target

    2024-03-06_e6de88fd7ac726ffeda822612202ba17_cryptolocker

  • Size

    62KB

  • MD5

    e6de88fd7ac726ffeda822612202ba17

  • SHA1

    d3b58f3c2903e66e6ed788afa7d1b40a2a015b09

  • SHA256

    3b76a5a05fa4e5e7b39e87d36f3f650df8a3ba6c0f2a7b0d9e15f654a64c6d2c

  • SHA512

    fb61fdb6edc3b3534033f7a9e4891df286ddd64608ee77c74ca52f69085ed00b2f9d4c3691ca70714011aaa940c57bb1d882886e1e926ee29434ce7a78db897f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsto:BbdDmjr+OtEvwDpjM82

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-06_e6de88fd7ac726ffeda822612202ba17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections