General

  • Target

    2024-03-16_ea322e7a9dc1f5fa8c33c8f4c0282c1f_cryptolocker

  • Size

    61KB

  • MD5

    ea322e7a9dc1f5fa8c33c8f4c0282c1f

  • SHA1

    5886770b701b336139d1f32c28c335e0728a026d

  • SHA256

    2e5bdbba3227d51695bfa9bf3acb44ac66790b39d86a818ee62ac96f4cb6570d

  • SHA512

    237c45894deee7021da3b67a6144e7d7b8acd67dbde3c05662102364423b4b75c1c384df95378f71373a96a0355a343bccd3edcf857137aaaea51d876bb47809

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6r:BbdDmjr+OtEvwDpjM8e

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_ea322e7a9dc1f5fa8c33c8f4c0282c1f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections