General

  • Target

    2024-04-09_e99f6713b90a0343c4e14f567b4d3df8_cryptolocker

  • Size

    61KB

  • MD5

    e99f6713b90a0343c4e14f567b4d3df8

  • SHA1

    8f3a3bd4e98f17e44e55cb76dfa5e10b73892dfe

  • SHA256

    c87ab112e1e3eac72447dc4e92b02a5dd999ad6219b6fdf2c2a6bc02699c080a

  • SHA512

    8e33a7c749471c12d65632265e7867280af7543fa38d234ed051aba170c47caa08a5718d1357d9396786899bd4fdb6305e430aecf3e03d3d7dbaf5c07c5923c1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsih:BbdDmjr+OtEvwDpjM8Y

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_e99f6713b90a0343c4e14f567b4d3df8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections