General

  • Target

    2024-02-13_be1e34c53e692b6278d990c958cf63d9_cryptolocker

  • Size

    39KB

  • MD5

    be1e34c53e692b6278d990c958cf63d9

  • SHA1

    c828902093bf9b772837ecf8cc789650e8783e6d

  • SHA256

    326c896ccac729f29ea9a9e26f8b9d2e5c4e701db725b2125418e4b3430dae14

  • SHA512

    937156750ee0cc49a3f2aed5e54e5c9c63b5c11660eba294767f527b5f483758c745e58fdf0c9ec3c9df678ec64e959a3d6b6ed58cfe62d11f41944bde5015c1

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/ysz81P:i5nkFGMOtEvwDpjR+viDz81P

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_be1e34c53e692b6278d990c958cf63d9_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections