General

  • Target

    2024-02-28_ba15e328719176a795aa0b4ba4dd6a9f_cryptolocker

  • Size

    40KB

  • MD5

    ba15e328719176a795aa0b4ba4dd6a9f

  • SHA1

    e3bc34171d6b361d07a8fc6ea9468c9938229357

  • SHA256

    0e492448fe23e882daf87a3bfe1b2b6768c1bb2d39152a3328ee763a4e7c3da0

  • SHA512

    b70f2ba0557cc13161333be8310b5bf96e0a3fe73fa496330272e5418353384ee4f3eac27ddc919ac41e426b1c365303dd1e8b8e3f9cd1f49e45c8137996168e

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOZ:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_ba15e328719176a795aa0b4ba4dd6a9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections