General

  • Target

    2024-02-20_ba6c212c33a5080d5b4a8b0062228208_cryptolocker

  • Size

    86KB

  • MD5

    ba6c212c33a5080d5b4a8b0062228208

  • SHA1

    aba9206ef235e82bfc72174bf9e4b1c90307431a

  • SHA256

    d8547b8a8de140687952821d10734225f9a6dec5894c2ef6b5f50c71fcb23457

  • SHA512

    9710ef4391990210e4ba87514ca073adfd6a30cc9ddf8caf75b3e18c1a2f4c64191f21ef3a79db642630d9efb55f4b34b9d911b61bcbe559c68b42e0d5f00d2e

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvAcH:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8AcH

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_ba6c212c33a5080d5b4a8b0062228208_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections