General

  • Target

    2024-03-10_e5e0feceecdc3c40a02b3a9ba7192b19_cryptolocker

  • Size

    49KB

  • MD5

    e5e0feceecdc3c40a02b3a9ba7192b19

  • SHA1

    90d428cd686a6c306861560bba31f5f5b96d7e4e

  • SHA256

    75b5816c5f48d7e630f47ac62771bc118a79043869a54ee7191f784af5afa1fe

  • SHA512

    581b8792be5db3f95abd98cd9b3720f87dc20f4dc2e43ba302e23be96781adeacf34f7ef13b709b28b62135f5b974957f638819eebfd13b4e43afe69c3b6a98f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvT:BbdDmjr+OtEvwDpjMXO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_e5e0feceecdc3c40a02b3a9ba7192b19_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections