General

  • Target

    2024-03-25_e44c5f1c5c5b7c209f61437645236284_cryptolocker

  • Size

    46KB

  • MD5

    e44c5f1c5c5b7c209f61437645236284

  • SHA1

    bd09b1b5c6bd84f427e84535502e22ec6f27ecab

  • SHA256

    0867a6336a07bcba03e2bf17b1155132ffae26861e92b734e81616857d21e797

  • SHA512

    382dd8fe0c0343dd7f7e073d8b0319426ac4d61c2fa4e139da635215187d7b67a049aea9b688f9edabab677534c675b86a5d98a1d4c31ca7853c4327df094d63

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MotaI:qmbhXDmjr5MOtEvwDpj5cDtKkQZQTaI

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-25_e44c5f1c5c5b7c209f61437645236284_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections