General

  • Target

    2024-02-13_45b6ac23d69df1c1c3d5272cbbb94168_cryptolocker

  • Size

    63KB

  • MD5

    45b6ac23d69df1c1c3d5272cbbb94168

  • SHA1

    3ba9caf9b5f65c25f5bcd396c096cb7502d82d28

  • SHA256

    041ad4b876773317f7095270bc4eb6cbac6c7ca018ad1d1d0f98351eee846b6c

  • SHA512

    ac1e129f3193dba2571530c910a110c4454af36c08f7c728cf37a072a7647bc3a018785c8a0cb7a48f8a24b1d8c06f20b1fc17d096171c393c24b9d48da4ddb0

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpEhhaUlPINw:6j+1NMOtEvwDpjr8ox8UDEpuha8PINw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_45b6ac23d69df1c1c3d5272cbbb94168_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections