General

  • Target

    2024-03-12_e23c2ed6147ad66c62ce3f69e83397e3_cryptolocker

  • Size

    60KB

  • MD5

    e23c2ed6147ad66c62ce3f69e83397e3

  • SHA1

    938428fbe17ff0b6e198ff249aac46d774ab5aea

  • SHA256

    a37377017260214ab0f9fb3cd5395cb4a9e592e596489304ee5698728f9699d3

  • SHA512

    f3ffde77d03c9b5d6c47f4acd97e686f5709259325e33e919c03b86ecf6bb2cd0edb4bcd49e5d153b5b10140379d1187bc2483612f33a22f49d8be0bb4966f2e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsik:BbdDmjr+OtEvwDpjM8V

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_e23c2ed6147ad66c62ce3f69e83397e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections