General

  • Target

    2024-02-18_4f3e24af2b2a054884d5c7c802b9b44f_cryptolocker

  • Size

    4.5MB

  • MD5

    4f3e24af2b2a054884d5c7c802b9b44f

  • SHA1

    7337f9a12abe0865c74ff2f77882b4ccc398d2f1

  • SHA256

    9ca4a854fc715c6537cb3c42f87b50ffb9965dfe9f34b49a2294f51c4e289721

  • SHA512

    7273d5c255caa8f707f1c72e69d43788a24704a4ec391d27849b6ad4d2e351fff3ac16908745f157235e3522b41b01e796d9d7392a8fbf7f942cb5cbd567f96a

  • SSDEEP

    98304:g/ZFIjBzldUfs/ZFIjBz7jSZD1tU7ymTn:g/ZFIjBzF/ZFIjBzPEUusn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_4f3e24af2b2a054884d5c7c802b9b44f_cryptolocker
    .exe windows:5 windows x86 arch:x86

    021d5e7849e90fdf4c65d3045c109483


    Headers

    Imports

    Sections