General

  • Target

    2024-04-23_f4af51be1d25214983f036cffdf0bab4_cryptolocker

  • Size

    40KB

  • MD5

    f4af51be1d25214983f036cffdf0bab4

  • SHA1

    a10dd4f9465a73525d1857a448183fd7b4d93499

  • SHA256

    c697cf5476665a27fdffdf42c328096b1435cbc6f7c861fe36c7a67dff72715c

  • SHA512

    f95ee065a80b6834914c2a01165f0a7044b7cb2947faac3c25a4a5bc698b0ca07e2b71f1b5340234063bae8697f23f8f3698def79182e600a5a66c59c8952db0

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRI:m5nkFNMOtEvwDpjG8hhXW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_f4af51be1d25214983f036cffdf0bab4_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections