General

  • Target

    2024-02-04_36bf5a94270504e28e216ea041755ed7_cryptolocker

  • Size

    100KB

  • MD5

    36bf5a94270504e28e216ea041755ed7

  • SHA1

    c752d862fbfe397ae81c935e2df662cf0ffdb20b

  • SHA256

    3767b0f7649acfdc1d1ab844e02dcec845705d25e12fc872eea2ae979017f210

  • SHA512

    8abb88e4c386b884cbfc4cc555f1da3b419cbdfbf4c201121ccb61b257deba2a36b5bf2f746273f325fc7bc3a1a9130f9a0a5839955f66560ff04bc094a4919c

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJHlv/k2NMc:xj+VGMOtEvwDpjubwQEIiVmkxv/D

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_36bf5a94270504e28e216ea041755ed7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections