General

  • Target

    2024-04-28_e5216918a883d431317fa63bf96ef200_cryptolocker

  • Size

    62KB

  • MD5

    e5216918a883d431317fa63bf96ef200

  • SHA1

    c3aa83aa8ee14b16c6bfc706e5a7563374a8076b

  • SHA256

    9ad381e3fb13419eb90526689ddca972e566b974cc576eecf259cd013d652823

  • SHA512

    7a6b6c828a5ba8f3596e7e6d847dcb2241eae086efc84445733a9d9c7de1283bdaf4315ad0dc04c85b196721e2c83c7d0e83c394163279f96370f7e1100201ac

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi8:BbdDmjr+OtEvwDpjM81

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_e5216918a883d431317fa63bf96ef200_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections