General

  • Target

    2024-04-22_6ec101355444cc2d6ab80b4a62b18236_cryptolocker

  • Size

    26KB

  • MD5

    6ec101355444cc2d6ab80b4a62b18236

  • SHA1

    188a1ac2f4ec88b421c2e9fc5e21d7c8b84facda

  • SHA256

    e5540e9b7ca3b890abc27e579973348acb508e254b6b155b638ac549d241bf19

  • SHA512

    595a87aaa6d578b2e41131a9af55090ef1dd278ceda7dde3dcac8d06ddd3baa85fcf6ae52f963c3b45dbf3d2589d6a6783833914ec90a402734d3d6329a89198

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxlmLZI:q0ZziOWwULueOSdE8tOOtEvwDpjeoSC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_6ec101355444cc2d6ab80b4a62b18236_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections