General

  • Target

    2024-03-12_e56b6816b23de694b453d01e85515f49_cryptolocker

  • Size

    32KB

  • MD5

    e56b6816b23de694b453d01e85515f49

  • SHA1

    2fdeacec89a4d696423986179f2e27181973535f

  • SHA256

    3a1adeda23e8b72817d1d158f96b0dded28870911268de1c9879490d22fbdef9

  • SHA512

    b31dfd5258eff9e20de26c71bf7fea915c32345145988ac786fa651d64b272d83912c5a308ab7e85acf04c37bf1962c5ae72d465929c5f879672d4990695a34f

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNgI:q0zizzOSxMOtEvwDpj/arqcF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_e56b6816b23de694b453d01e85515f49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections