General

  • Target

    2024-02-11_16e220a37623b641c0f991f30c300e09_cryptolocker

  • Size

    40KB

  • MD5

    16e220a37623b641c0f991f30c300e09

  • SHA1

    b076d9ceea8a0e971ab0f2464a65e5a02fdbad94

  • SHA256

    cc038a7900ac5bf9f145835be4bfc7f044dc630e20aed7c4807ec9f0417b5f75

  • SHA512

    63ebf43839fa60bc10496534950501af56a87fc9390d35c9fc9d59e7b3434902a326a731338e0ca10b0327d3e1ed9fe5dca3abd9d7401eb18cb93a46debbcd66

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/Ctz:6j+1NMOtEvwDpjrR2z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_16e220a37623b641c0f991f30c300e09_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections