General

  • Target

    2024-02-23_d417cb80e58bc31714357b948b0eac52_cryptolocker

  • Size

    39KB

  • MD5

    d417cb80e58bc31714357b948b0eac52

  • SHA1

    4856e7d873f5537a6ecfc9355d415c503a8c5c2e

  • SHA256

    807cdec13cadceae22bca3784ea4c4536835ef3ac22b87160a9eacde998b26f6

  • SHA512

    b209bfb8c33a5a5d9e982ab2dac424b65e2066267dc629eb5d1ecfc308a208cb342923376853bc71b327038ba23dd844a55a8259d20eefb9065a2a3ae8da515f

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/yYf1:i5nkFGMOtEvwDpjR+viHf1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_d417cb80e58bc31714357b948b0eac52_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections