General

  • Target

    2024-02-22_ba413ed6fe778f601dcc23f79989a836_cryptolocker

  • Size

    40KB

  • MD5

    ba413ed6fe778f601dcc23f79989a836

  • SHA1

    3ee5efc1447921e1edcb83c86712d22a76409be9

  • SHA256

    07ce5745e25d227661ccec3ee3c20c63cc784192028aa69c371c900bd188fa29

  • SHA512

    365d9b065e54736564f83ef3456c6dad15da3bb58dbe3b0d85403a3275b864e1264b250e92872963c91a6be7cd9bad92a9a1f143240cbbb78ef9f7008f750862

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/CyYo70:6j+1NMOtEvwDpjrRD70

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_ba413ed6fe778f601dcc23f79989a836_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections