General

  • Target

    2024-02-17_4c7eedc901c4b5f298bd0de2c241da75_cryptolocker

  • Size

    101KB

  • MD5

    4c7eedc901c4b5f298bd0de2c241da75

  • SHA1

    7eb4a230123cbdf55aadc1b5728a16fbc63a5e95

  • SHA256

    efb2c1d76ee745c0cdd2137e0e45d0386f4063223936bb68c48c0344f5f1a2ee

  • SHA512

    3b5e0a140240b94aa451ab8d78c7568de5ff39d4bf47acc51cec7aa712321719b569fe0b1e32f9bd722393e455cb7bcfa0c77066de8629f41b489ce761e2bdd5

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRiWjzUNojlEyk:i5nkFGMOtEvwDpjNbwQEIikgNyET

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_4c7eedc901c4b5f298bd0de2c241da75_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections