General

  • Target

    2024-02-13_7e8beb470edf3d0c5e23e3080edf9c84_cryptolocker

  • Size

    48KB

  • MD5

    7e8beb470edf3d0c5e23e3080edf9c84

  • SHA1

    3701ef47916998c10c02f8f1ca24c37a68cb7cd4

  • SHA256

    ea8487f7574c4e65c32b3564409e01c1d03d140d6e8d272db14b9033a42edc13

  • SHA512

    637f5a838df561b20c1728d4f9ffb3238cb448b52e14d32f4ad753c0c641a07e429087b4dbc8dd6254498212a5a68c2496604f552a4d25a3b20b0c58850f1fa5

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/3lQIqn:XS5nQJ24LR1bytOOtEvwDpjNbP/3lHu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_7e8beb470edf3d0c5e23e3080edf9c84_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections