General

  • Target

    2024-02-04_316f0dba0153ef16b0f80e173343a6ee_cryptolocker

  • Size

    83KB

  • MD5

    316f0dba0153ef16b0f80e173343a6ee

  • SHA1

    8f6f8210c3846f88e66545141eb4c1795906c825

  • SHA256

    618fc6dbca59ceb4a7f12fac94e708ac808c111cdc0e95b0e82621c5c0c2abf4

  • SHA512

    faabe9e2bd8a74f985e684b137f1d076db90a28771259d21e4d90d7418a1d9690aa2ce537ec45a79b6cb9cbf846a4f2f20ef8b9d0d822ec1cb0d8b6a2db36713

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvF:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8F

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_316f0dba0153ef16b0f80e173343a6ee_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections