General

  • Target

    2024-04-16_53a6b42e2c63c290572729480823bce1_cryptolocker

  • Size

    49KB

  • MD5

    53a6b42e2c63c290572729480823bce1

  • SHA1

    90a001bc85dd34c0b6cf76437371e9a344ff6d13

  • SHA256

    a13a421fa3060ec44fb33cf5aa9c240e0cd3f47a52246fdb7e0b8d4de27b7997

  • SHA512

    e333de5a7932205e8321d4a8e1d30f867d684ea0eecee353e7373469cf3632b037e1b4801fb5cee7d6b289dcf7f306777ba1603aea285e3c4804265d49341d3f

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvhx5/xFRHn7eAW:6j+1NMOtEvwDpjr8hhX9JW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_53a6b42e2c63c290572729480823bce1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections