General

  • Target

    2024-04-10_1e695bf58eb69d31510b4841135e1955_cryptolocker

  • Size

    61KB

  • MD5

    1e695bf58eb69d31510b4841135e1955

  • SHA1

    e1277ce6d87ee2cd0dbcfa59f9ababbf3f6fb940

  • SHA256

    3a6927cfdb083b9c18dd3da7de155b518f0b99ffe65d4a4dc0783d9fe687d4f2

  • SHA512

    5dfd2e709b4b68bca6c710340ee8c457a97b66335e4ff478250d747a73fb2c0c78ec31192d960dc2f43a16965bb37bd77a47bd5c602390bab25019ca4e0ecc81

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsij:BbdDmjr+OtEvwDpjM82

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_1e695bf58eb69d31510b4841135e1955_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections