General

  • Target

    2024-02-22_90326e69d8cb6d4f3fd8bb31f9541277_cryptolocker

  • Size

    40KB

  • MD5

    90326e69d8cb6d4f3fd8bb31f9541277

  • SHA1

    360f198f7ef2606dedd124887b1cba359d799b5f

  • SHA256

    ae391152807f53121a1b56412117dd8de3cbefb98c3279aa3e8a69d1b5e659e7

  • SHA512

    6cc87c2f1698c742a8d49425d7ed44cb310b3a2357c44dbfd5a23cc5b5a5cff35ed9b3917e379c43e07bb2b73f5c37ac52c83f8746b2d0337523c290b5e4a389

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY+l:m5nkFNMOtEvwDpjG8hhXy+l

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_90326e69d8cb6d4f3fd8bb31f9541277_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections