General

  • Target

    2024-02-14_4a3034c4e340b81a0618dca14901d562_cryptolocker

  • Size

    63KB

  • MD5

    4a3034c4e340b81a0618dca14901d562

  • SHA1

    bc290ee4efd7bb390bc1e6233045237c99a9bce2

  • SHA256

    13be9b8d1e06ae35077688a8073129f39462277796894254b7a47c306fc48b2d

  • SHA512

    ccdb63b9693c6e325937e5987a33a965fc853ba20961223d608fbcf71787fad2594e825790f28ca6d876a9eaac5a25bdb72c6fd76fff7a2ebf75c85914e78d77

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEO10Km9M:6j+1NMOtEvwDpjr8ox8UDEy0Km6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_4a3034c4e340b81a0618dca14901d562_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections