General

  • Target

    2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker

  • Size

    64KB

  • MD5

    ba4cc6f80a554eb3f5012bcd0671c913

  • SHA1

    73a4cc719ecb5f16a647ff6f01e121af9f53757d

  • SHA256

    a894f7a349ef6a665d99d1f36a829b7776ccba400ffdafef25397293548e0f7c

  • SHA512

    210bab4679273a74e78a79ab4691540b5114e06d4f23382eaffd0c87709c804f4c7e2be2251dee97c6574ca34181256faf1a0f0be173d8eb7b0d118078837c7a

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEpE0P/xtP:6j+1NMOtEvwDpjr8ox8UDEpN/rP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_ba4cc6f80a554eb3f5012bcd0671c913_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections