General

  • Target

    2024-02-21_d4fb1a352f609ae3ca0d65234ed1c52c_cryptolocker

  • Size

    40KB

  • MD5

    d4fb1a352f609ae3ca0d65234ed1c52c

  • SHA1

    59e085aa37925eced657e3ce8960d32dd0b8e127

  • SHA256

    1f350758949afec4ef31502c17d252d8628b5eb1a75cda3a28216c6259a3f9f8

  • SHA512

    918ea289ad2712927278088ac6db6e97e49e93761892b1c8a35143c51c777823779e5a219856726d446030fa4511085fbb8c16449afa1eeaca413f61d61fba2e

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRrS:m5nkFNMOtEvwDpjG8hhX4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_d4fb1a352f609ae3ca0d65234ed1c52c_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections