General

  • Target

    2024-04-11_e36ec6e7ca8f9e70aee99d66e6d86c7b_cryptolocker

  • Size

    45KB

  • MD5

    e36ec6e7ca8f9e70aee99d66e6d86c7b

  • SHA1

    8fae1b7e5c56bc7ac152d072d5c8ea577de1237d

  • SHA256

    74243f24b8a068f39a279578f2916b32a8589e2551e4c55c3fb88eaacf81d77a

  • SHA512

    7ee5e8933825a3d2b630426b401dbf5043518da0614d78843aea51c8e798b4803896425b0a4a772220929293485d549abbd921e155d84e0284e6e2055a7761de

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo1Z:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_e36ec6e7ca8f9e70aee99d66e6d86c7b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections