General

  • Target

    2024-02-21_40321b0d0e50e334b3721b8450c32e6f_cryptolocker

  • Size

    39KB

  • MD5

    40321b0d0e50e334b3721b8450c32e6f

  • SHA1

    1320e7463f3d4544eb56abfa9f4b3f0bb0e84b95

  • SHA256

    c6bff1b359545bc413412b58bf63945d256e11a8a35b55785591c6171b4612ab

  • SHA512

    697a3f344f59f31fe7940b93677c0057a616945f8d161592adb2b3dd400e143040d68d65150c6f32a9afe46a2fe6fc3034cb656a971c03e9bcebe63f259fc2f1

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvP7DMgJ:m5nkFNMOtEvwDpjG8hP7DMq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_40321b0d0e50e334b3721b8450c32e6f_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections