General

  • Target

    2024-02-19_4f706467c4ff5c694e01326449db0a58_cryptolocker

  • Size

    40KB

  • MD5

    4f706467c4ff5c694e01326449db0a58

  • SHA1

    33e6b612075f19f88301211250b718cfad07e140

  • SHA256

    51744b6804534df4e7c919f2c0c3f7081aeea4388ce014876e6e1ffaa2dba465

  • SHA512

    f56af83ddea4723886807a79859792bd30e4d0af15de0abc1ae54168d2f0d3160e853aa9245dbca86099ca30ddcdc781b75696acdd5ccc0f4e017d69adab7b67

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRn5:m5nkFNMOtEvwDpjG8hhXr

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_4f706467c4ff5c694e01326449db0a58_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections