General

  • Target

    2024-02-13_69681317d084e17dee2d923a8f56f007_cryptolocker

  • Size

    40KB

  • MD5

    69681317d084e17dee2d923a8f56f007

  • SHA1

    0c99810a968e1bc167d588665fef5edda067379c

  • SHA256

    c248a6a76e98671922bc57633d854aa980dac3abde281374628c9fbd27ad9430

  • SHA512

    6f9ce75d021909b7bb3394fff24e1fe9c5e002352fced4fa29c56fd008bc539793dfa0469553b6ed03a5a4b20ea66bddf243768bbb6d5c02701d339929026c1e

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/Ctf:6j+1NMOtEvwDpjrR2f

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_69681317d084e17dee2d923a8f56f007_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections