General

  • Target

    2024-02-21_7ed989be08712f1c0b48183ff879f9fa_cryptolocker

  • Size

    47KB

  • MD5

    7ed989be08712f1c0b48183ff879f9fa

  • SHA1

    a93f19b786b54b5ee957fcbd1c8d090df19776b5

  • SHA256

    8f91369688076693a2181f0523f12a8adc7c3c9fe13f169d1cc6e9ad7114aab7

  • SHA512

    d558e2d6a1a9b673c5537a85eea849fd916cd2c8dcaa1daafeca8ee7f213958b9b4a088a5a156ac5fb2f282c7993fa9b8ceadde9d6eedd414cd091d14408f02e

  • SSDEEP

    384:icX+ni9VCr5nQI021q4VQBqURYp055TOtOOtEvwDpjqIGR/hHi7/OlI0G/7Ioqxi:XS5nQJ24LR1bytOOtEvwDpjNbP/Moqxi

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_7ed989be08712f1c0b48183ff879f9fa_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections