General

  • Target

    2024-02-18_d16f29c4afcfc737a785cf25662c5f3f_cryptolocker

  • Size

    47KB

  • MD5

    d16f29c4afcfc737a785cf25662c5f3f

  • SHA1

    af6f134fcd8d5cc936ee1873c07337e78f6e9489

  • SHA256

    24066b1d7859d0d967976bbcdb4bc88bbb7e30789fcac3d0e1c2cad4d38875b9

  • SHA512

    6a06c86728ed1b3802e0c4c6a7058aa7b153581c04cfae6fb8c9f4b06bc0ffac63523eab06a2912dc363338d10286d56b721bff16b0f64396e63b3a1b33ebdc9

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/3lQIqp:XS5nQJ24LR1bytOOtEvwDpjNbP/3lHM

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_d16f29c4afcfc737a785cf25662c5f3f_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections