General

  • Target

    2024-02-20_7e948ae4a4106634dee52da7849a6193_cryptolocker

  • Size

    38KB

  • MD5

    7e948ae4a4106634dee52da7849a6193

  • SHA1

    3bd335b16d5f23bc7c06b2281dfcc17b02c8982d

  • SHA256

    084c33d27d3bc3f44a3d61c385b7def229544d2e41b6b106174d449d91d51072

  • SHA512

    b9b764de5ba946e1ca467e6f11a9ddea0e355e5dffa6d98005cad220effdbc3b03b033be95605d927517c2f5988c53b6c160a445a92ece046f0f957db6ab5730

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpj66BLtldJQL+:i5nkFGMOtEvwDpjn/JQa

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_7e948ae4a4106634dee52da7849a6193_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections