General

  • Target

    2024-02-14_717c6a2396c292ed63b2bd0cd3e3b6c1_cryptolocker

  • Size

    47KB

  • MD5

    717c6a2396c292ed63b2bd0cd3e3b6c1

  • SHA1

    5fc5ebdd015ac6039d84b8c80cba98160f6ee77f

  • SHA256

    d7b11c26e3400db3d74f9b62e5be6673a418999763a000c29f9b808dc9cebbc6

  • SHA512

    39842bc1fd0f7c9b8712ea1b1577e65ab2e31e89e5c1c7bb3ac1e1350a10b63b387edc4fbfd359f862c75d944041991b5c64b0faa3e30eda591885b506327835

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/7Ioqv3:XS5nQJ24LR1bytOOtEvwDpjNbP/Moqv3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_717c6a2396c292ed63b2bd0cd3e3b6c1_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections