General

  • Target

    2024-02-19_d16df4ed8465cc0a347d15cd0d3a025f_cryptolocker

  • Size

    94KB

  • MD5

    d16df4ed8465cc0a347d15cd0d3a025f

  • SHA1

    5a4435a8fb177a52123328016ee602f26f70c776

  • SHA256

    bacf1eadb9f5eb0df26b91822f134cb95a2e844cb916e150aa0a0c7cc2edb9fe

  • SHA512

    dbebb0e26f6a0483b88f483599be83a3562a8b9217980ba1d3c9d89d2d5c68ecde640953c42d0ae870dd3c40a0e230b32968657f17fd925bc73d3c577c91cf7a

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJW7M:xj+VGMOtEvwDpjubwQEIiVmkq7M

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_d16df4ed8465cc0a347d15cd0d3a025f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections