General

  • Target

    2024-02-03_4ad6cfc286b039734748dba52e1ceea5_cryptolocker

  • Size

    40KB

  • MD5

    4ad6cfc286b039734748dba52e1ceea5

  • SHA1

    ee9ed7f7e4db6fc074097a29bb93bb8949c0701b

  • SHA256

    74e5a6ea69f2040d5da989781bb6056e02faa594a00a7fde81e259dddc4406fd

  • SHA512

    0c129c462da635d2eadbc602b5eebba9838c3f0cb0d551ff3adf1367f85575aee74e7ebe9292802032bbd2a3e23aba7169504eb34ff0eda6d7a35dce396c66eb

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOx:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/T

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_4ad6cfc286b039734748dba52e1ceea5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections