General

  • Target

    2024-02-12_f4bacc21e5b9c134594c71b0374a0dcc_cryptolocker

  • Size

    46KB

  • MD5

    f4bacc21e5b9c134594c71b0374a0dcc

  • SHA1

    e842cc1a7785a762e464909502674a4b9904be2a

  • SHA256

    9b773279a83196224fe3c473c3f85cce3566ae70778829b2f347b6da1ac8a989

  • SHA512

    7ca0e0cef1d1103edece2a0020a1bf7130bcc717f2c87db1164700b7820a99ce45a78d0f745ee0cb3325ff261f855fcc77b6ac491cdb3e3cd0310ee700e5d917

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/3lQ:XS5nQJ24LR1bytOOtEvwDpjNbP/3lQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_f4bacc21e5b9c134594c71b0374a0dcc_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections