General

  • Target

    2024-05-20_e86347a8beb4b77550460539b3fe7a8c_cryptolocker

  • Size

    63KB

  • MD5

    e86347a8beb4b77550460539b3fe7a8c

  • SHA1

    b232ee20c3ba947a3b225d674f9570c0d7eb5dde

  • SHA256

    47f697cda371cf7bafc2bf5b29021bd0573ba70d4583b1caa13534dfe75cfc1f

  • SHA512

    8debd1bcde720b39012ef9111cd0f39985e5c804c422ce3277ae4b5ae9813c8d21536bb46830c38577926dbe584ea9c8f90261ebc36f45aeaa4361e18e7af0f4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiN:BbdDmjr+OtEvwDpjM80

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_e86347a8beb4b77550460539b3fe7a8c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections