General

  • Target

    2024-03-19_ed23e92f069a09103949f924f383e7e8_cryptolocker

  • Size

    30KB

  • MD5

    ed23e92f069a09103949f924f383e7e8

  • SHA1

    2f58deeaaa7f9f0764600eaae6033cb1d7b11a08

  • SHA256

    5f416284de43a32783826958d29d936265dab93e2a927f49f84795945e1ab852

  • SHA512

    2b5eebf1c728a4e84911a25338106c843f3eb9925fc05574efbd8fe05942f28564220185cff099247f0f624de1c2838cd0dadb1de31f80bc8e529aa75fdc1d32

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xOcsTts:q0zizzOSxMOtEvwDpj/arMHTK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_ed23e92f069a09103949f924f383e7e8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections