General

  • Target

    2024-04-20_ee9b53afb8a594b5710786881bfe5cf7_cryptolocker

  • Size

    46KB

  • MD5

    ee9b53afb8a594b5710786881bfe5cf7

  • SHA1

    f421f119d7a0189bd47fa58bd76f50ec23865016

  • SHA256

    7ab960fbe2cab69eb669f040dc9fdc2b063b9bb4b7abd5b53181235246f2f283

  • SHA512

    83a07078e1b98bcce70d4737c242d9796c00cf09662094dd9fe30204578af17c1f907db32a0486b12ee5e29e968184304a00f6f92aad4f86e97db563c1e01b70

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAg:qmbhXDmjr5MOtEvwDpj5cDtKkQZQB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_ee9b53afb8a594b5710786881bfe5cf7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections