General

  • Target

    2024-02-21_f50d1b235c48a9b4bd0d33c8665223df_cryptolocker

  • Size

    38KB

  • MD5

    f50d1b235c48a9b4bd0d33c8665223df

  • SHA1

    10c86958c90ada6b2a607a9a3c3abc2805a7372b

  • SHA256

    c64be6b3d8c005494a4bc6953402c854913ab2a16c761f9cfc0f25cf0a85c8fb

  • SHA512

    3466c4242d3566da4ff65eca8326aaf2c6a991aa1a30f51631c9bfced9080b60d3ffb080e00df4194af551e9a0651db59d3ac7df63ff994e1c0b9b6294489503

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRhpky:m5nkFNMOtEvwDpjG8hhXLpky

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_f50d1b235c48a9b4bd0d33c8665223df_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections