General

  • Target

    2024-02-04_9a417d4d2f0fc9be163225ab8cb7f111_cryptolocker

  • Size

    83KB

  • MD5

    9a417d4d2f0fc9be163225ab8cb7f111

  • SHA1

    69c0879ad527d0c481e1ed14d5c2c6474b7f4b70

  • SHA256

    ab45f7aa115cbeee8d5092d2e5fc9ead45a25125c19e6f6a0be38e4d971590a7

  • SHA512

    975e4f9df5424640c93d2f58a9e395417cabe0ac4e9d9a703a1f6069d449148691ca38124c4932c89842851d326e38ef334c836bfbe32860f168239c6ca01688

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvP2p:i5nkFGMOtEvwDpjNbwQEI8UtzNcO8e

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_9a417d4d2f0fc9be163225ab8cb7f111_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections