General

  • Target

    2024-02-14_654b2bc25c7fa034c257df2ddba5f918_cryptolocker

  • Size

    40KB

  • MD5

    654b2bc25c7fa034c257df2ddba5f918

  • SHA1

    b800c17d4f603cceec559cafadcbed22e52fbd54

  • SHA256

    fb36509f8e43472fb51b68fd47e1ddd7eed8d3e27721368b9df0fa7e93d80a19

  • SHA512

    e27ea769ae73b3614a127265bd23b953973c4bde23a6e6d99a0fd23d22f1262d0546ee6768f344181f240997b9d057a705c4e4fc8953085b69dda8ffab8b7ccc

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY+q:m5nkFNMOtEvwDpjG8hhXy+q

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_654b2bc25c7fa034c257df2ddba5f918_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections