General

  • Target

    2024-02-23_0f50c4af29a50beaf6f639be7a6af913_cryptolocker

  • Size

    65KB

  • MD5

    0f50c4af29a50beaf6f639be7a6af913

  • SHA1

    180aa866ac5ea7968fb0a45e66d9490b00ad1202

  • SHA256

    b3144054e86677e509518f27a7cde72f4937b1a724e298b7e16b23a7b91d5f64

  • SHA512

    208ca240c6ca8ab87a36a94546270b40ef8df1b274ee0dc62d8e69b4d3dc210ef8983ca8c8083611ad14a8b46ec5ddb887270c1d850d7449a2682ea22978f4ed

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUI4v2:i5nkFGMOtEvwDpjNbwQEI8Uw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_0f50c4af29a50beaf6f639be7a6af913_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections