General

  • Target

    2024-02-19_4f0670a305109f902b0f87808e5ad698_cryptolocker

  • Size

    40KB

  • MD5

    4f0670a305109f902b0f87808e5ad698

  • SHA1

    ede948facb88d6c265a7f6ba88e1c518046fe64d

  • SHA256

    1c733c814a7eab3aab3d9680c925e1ca9ae119d52ad9db97cee6ea56f7200b78

  • SHA512

    fb8ef1b80c071bb2ab0a83594e90d1fff7728bbce6e29697059972a6214e07b62356da840c2614d8ec04b209ec01be67f1441e28ea72515f94ccc216fe05fd94

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY+b:m5nkFNMOtEvwDpjG8hhXy+b

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_4f0670a305109f902b0f87808e5ad698_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections