General

  • Target

    2024-02-20_4b031bdcaa52d061fa5c3d33caeec31c_cryptolocker

  • Size

    40KB

  • MD5

    4b031bdcaa52d061fa5c3d33caeec31c

  • SHA1

    2f691e1c15e88a058f9a0cffc61d28d064df17b4

  • SHA256

    028e2ea983fa8aeb5eab4baa857bbfbfffda7676997ce1df9b04bfea11d02cf1

  • SHA512

    7b05f61471aa24426e87c62270ec0e7eb30abb82c6e7ae7ec817839e16dde76cd5ca64931c18083c7ea1a3cedf12877ed24d900087b03d1b8fedb7a96f6e9cdb

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY/3r:m5nkFNMOtEvwDpjG8hhXy/7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_4b031bdcaa52d061fa5c3d33caeec31c_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections