General

  • Target

    2024-02-24_4d67a212661dbb90767e0c3ff4d36e1d_cryptolocker

  • Size

    40KB

  • MD5

    4d67a212661dbb90767e0c3ff4d36e1d

  • SHA1

    3e77780730fb84a62a617b8e50ec1257d66c4d5b

  • SHA256

    786ff673ac1903b89939529eb53eb77d392fd6925ec3e88d883a9c3c1cc01d23

  • SHA512

    f4da11b4a621462a047e37ef6e2c9bd96b5c9cffb80cb4a05bbe9ba29083006a8cb079b49e1d53f5eb14446d3802f732b6bd7c153f02da5b475e4a5b9f677957

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvgpnIScti:m5nkFNMOtEvwDpjG8hgpD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_4d67a212661dbb90767e0c3ff4d36e1d_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections