General

  • Target

    2024-02-20_23e39e6b65976b001ca28c72191b0dd4_cryptolocker

  • Size

    51KB

  • MD5

    23e39e6b65976b001ca28c72191b0dd4

  • SHA1

    71cc9e975e82bb2b44c629acacf0b7f3b0a4ac50

  • SHA256

    a6dae942751449b927f7ef548c0ce198abd55613159e008ea49f01608c33e6bb

  • SHA512

    ac135f994156e1da41e400a7fc3ec24e79ce3c02c7a668fd1262ef897d53bed1dd63795d561cef452d2a2f4c1d30172f5db09fb4c55d1728e85607a3980dd0ea

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MzF3F6:i5nkFGMOtEvwDpjNbwQEq0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_23e39e6b65976b001ca28c72191b0dd4_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections