General

  • Target

    2024-02-19_ee40b9bad92b26f5c592eba9e1c871d5_cryptolocker

  • Size

    40KB

  • MD5

    ee40b9bad92b26f5c592eba9e1c871d5

  • SHA1

    666af37905467a7d739f5a9142804064d8babb97

  • SHA256

    9f9253d1180c2014afc653f1e57fa2b02ed8d889e978deacef184a90077cb1b6

  • SHA512

    846432ac5ad5a671439eb046e5aeddedd4bf643c844960d263729d46c4b00d673b00d9a86ecf1f56608ba321f0683afc3e53e812ec8239362755c34f73666ed9

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY/3q:m5nkFNMOtEvwDpjG8hhXy/3q

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_ee40b9bad92b26f5c592eba9e1c871d5_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections