General

  • Target

    2024-02-22_9b1f69992e3c6f5ae3fab14e7bc5a499_cryptolocker

  • Size

    85KB

  • MD5

    9b1f69992e3c6f5ae3fab14e7bc5a499

  • SHA1

    f83d926e94c4b2969ef5a455489880704393f727

  • SHA256

    9e7147fb1142bf3986347ec0741edaea0225215fe9f88aff8b8b83541ca058e8

  • SHA512

    7e64c3e36f6bff0c073ca5d24b7f87f2d53d36d04fdee72709636ff7f939c2946fc936f86c9ee85316e4ff8fe16ebcf5d1b55e373ee9bb7a5f6e695fe001042d

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKazNclMjNUvP29yQ:i5nkFGMOtEvwDpjNbwQEI8UtzNcO84

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_9b1f69992e3c6f5ae3fab14e7bc5a499_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections