General

  • Target

    2024-02-12_fe7c8d2f37e11d5e3c1e1b87729a5b97_cryptolocker

  • Size

    46KB

  • MD5

    fe7c8d2f37e11d5e3c1e1b87729a5b97

  • SHA1

    739a59a99055d06fef6ae1383d4b57b449393a36

  • SHA256

    db6e240277b8a9d94ea12f3fe9830537b28a495f9d5f6547c8ca67a6f89bf490

  • SHA512

    eb1c69f086806a10b716bd6737583c7600004899d66d192594a258a9d20305b10024927e1f23ead68efda0674928e43e1d6c60fd8f1ea681a59531f6cd4f6d96

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/3lV:XS5nQJ24LR1bytOOtEvwDpjNbP/3lV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_fe7c8d2f37e11d5e3c1e1b87729a5b97_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections