General

  • Target

    2024-02-14_0a8a370e6f0859cda20be02707b67dfa_cryptolocker

  • Size

    54KB

  • MD5

    0a8a370e6f0859cda20be02707b67dfa

  • SHA1

    fb019ad14b96e040b53fdf2769e5ac9e63671a6c

  • SHA256

    23a0ea2a4da310d1b1b3886a5b89b828538dfd69282628301c306a1da0506e15

  • SHA512

    cd2c3f4083baffd9271f21724487d9c4b5208212b4b5c01ab8256d33dec85c99734c8c0b31bc488f09a2e5a19665bc3cc75acb25d6841fe3dc5fc2a91b2fab60

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QJz7m:6j+1NMOtEvwDpjr8oxEU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_0a8a370e6f0859cda20be02707b67dfa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections