General

  • Target

    2024-02-20_06fa26711d4cc363c530b0beb3d5f7b3_cryptolocker

  • Size

    40KB

  • MD5

    06fa26711d4cc363c530b0beb3d5f7b3

  • SHA1

    8b562f3d94f7a1368ea9873426cc8788b459700f

  • SHA256

    71e7e37a1174f033c51986e461cd19a2cb2510478a14130010604b2c913d27de

  • SHA512

    8e54e876122dfa31d5381c14f160c4031ed7bafda334731d75dbc2a086bcdd532f61d6644cead021e602b3f8beb27e7bba36bf7dffe8be07ab425c58ecdbc2c8

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY/38:m5nkFNMOtEvwDpjG8hhXy/38

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_06fa26711d4cc363c530b0beb3d5f7b3_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections