General

  • Target

    2024-05-02_e6f3d9c5658ecbb1419725403669c889_cryptolocker

  • Size

    50KB

  • MD5

    e6f3d9c5658ecbb1419725403669c889

  • SHA1

    9780244653d430ddb3398d8d8a6789a252fb1fd1

  • SHA256

    8a38b5b3e2b9c618dd173a397ca78b05c4cf367dd61645771245397d8191130f

  • SHA512

    b653f3a31954fec7de61580a920033975df94a9c9e31ad02928776f7aac10cad36c3901dd2f4c6fe1b38b70d7cc712726931e53c95e9e6de325c29fac7fb7b2e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocci:qmbhXDmjr5MOtEvwDpj5cDtKkQZQA

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_e6f3d9c5658ecbb1419725403669c889_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections