General

  • Target

    2024-04-11_3169ae7bff5a0b8348d240b27927f324_cryptolocker

  • Size

    39KB

  • MD5

    3169ae7bff5a0b8348d240b27927f324

  • SHA1

    7d4275695d073f28be5cab0b5a815e92336c509d

  • SHA256

    bed6b0a98cdfee4c7d75091bce4fa2973ed3afc4db3352f7c340ba45599d4530

  • SHA512

    d84f60cecfdf62d857fcd27822a14b5093c96abdaf3b0c537f4b308b6c3fb7cc4c7b42ad238b7c2b8e97463f3c4740945afb1ae1bb8c3000e4b187b26c0f7390

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnv00GxmQ:m5nkFNMOtEvwDpjG8h00GxmQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_3169ae7bff5a0b8348d240b27927f324_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections