General

  • Target

    2024-02-13_4fb56ce3c8a0c7c3cb9f8fe2c7807323_cryptolocker

  • Size

    93KB

  • MD5

    4fb56ce3c8a0c7c3cb9f8fe2c7807323

  • SHA1

    a14c90c0d4d34fae80b1fe6e04d867db0d0b5fc1

  • SHA256

    51033f0089737020616edfa825429e902b20d8616dfcf963b4bfc275abc30e4d

  • SHA512

    6d2433625e66505577a22b8f253b91c4f4d2e4256928dde5c45903ac193fb4ce02c3d683adcc03a8ed63ead75a72a16e7f9e46bfe574a2112bf248abc1ac5889

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJY+:xj+VGMOtEvwDpjubwQEIiVmks+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_4fb56ce3c8a0c7c3cb9f8fe2c7807323_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections