General

  • Target

    2024-02-14_693570558d4b393b9e5f1215c070e653_cryptolocker

  • Size

    50KB

  • MD5

    693570558d4b393b9e5f1215c070e653

  • SHA1

    f82adfb2870e483f9d4cf64b463b0a3e3b75926c

  • SHA256

    f586cff721ede649cc88d8454bccffc9d03bf5524a5ddb54fa33ae55f5e28bfe

  • SHA512

    72f0cb1832000b14864ad977546113c62d8648f389f448499746bb969a14ecb4f903c4be6ede36b6484e5ac24225d93de19764eedb2718becb07030ffd944cb5

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MzF3Fq:i5nkFGMOtEvwDpjNbwQEqk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_693570558d4b393b9e5f1215c070e653_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections