General

  • Target

    2024-02-14_f1c83080692e7f87c9c6662590d0c6e5_cryptolocker

  • Size

    40KB

  • MD5

    f1c83080692e7f87c9c6662590d0c6e5

  • SHA1

    3ee5023d7837e50c4871c24972209dd1eba3212e

  • SHA256

    de6403ce615ed1b5cc2a5d4b416e6cf32fa1a9abc22332d8238d616bc836acd4

  • SHA512

    2be8f03a5fd4f0c135c0ae8d50634badb3e180bbbe48ef0dd29a803455467fd531ca0798198900ceb2f0f3872ab162ee42e04a8b68e23310ab447bb1d20ab20f

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY+8:m5nkFNMOtEvwDpjG8hhXy+8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_f1c83080692e7f87c9c6662590d0c6e5_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections