General

  • Target

    2024-02-12_3d7d5d2e500b671e2cb971c1f4e5414f_cryptolocker

  • Size

    50KB

  • MD5

    3d7d5d2e500b671e2cb971c1f4e5414f

  • SHA1

    cfa884adee5433391b4e4a25ca3b3b6a5dc83518

  • SHA256

    ed3e51d49aa3a71a897d48fe70adca127ba20da630d7053618863ed3ecc580dd

  • SHA512

    5c86d2b8a48a5d45505dde14cc80a0635fc2f10cb572ee82888726d62d15c3d043eccb5e185815bc09e43e79ed7288fc49da86d966924da72012a658e585dd0c

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MzF3F+:i5nkFGMOtEvwDpjNbwQEqY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_3d7d5d2e500b671e2cb971c1f4e5414f_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections