General

  • Target

    2024-04-10_4e4a1f542dda8ff17b397b42bb1711f5_cryptolocker

  • Size

    38KB

  • MD5

    4e4a1f542dda8ff17b397b42bb1711f5

  • SHA1

    6443a18f1dca32c615b387df0b299ad738806255

  • SHA256

    a1ce9f44fbdd21d9393a7ab0e21a0dfdf03141acbef9ff7da986b978c97b5509

  • SHA512

    e9689aea695119769b0eafddffba634832978748a3f1aefec66b842ebc3dc051ce0af299e2c72a8e3d5f331c47edfeabc4491ae054d7fd1c890a4cd2fb244597

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnv00Gxn:m5nkFNMOtEvwDpjG8h00Gxn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_4e4a1f542dda8ff17b397b42bb1711f5_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections