General

  • Target

    2024-02-14_4d8f35d1a4247b0ff2b89639408b012c_cryptolocker

  • Size

    57KB

  • MD5

    4d8f35d1a4247b0ff2b89639408b012c

  • SHA1

    a37bdb0bcef18ff184a63cabe4c4ec7e37c750dd

  • SHA256

    ec6510dab83234014d7dd134f97e3f994430d6d318c2e902683b47d8bc8507e5

  • SHA512

    cea0299e5b501260fe47597c0f328dee3a386907cd7b935d2c4edcf003b2e3892241e8bf1ed01fef2ac89c0db5af28e5f1c52cd123ca2dc6995724a82ff14433

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7Goi20Pbd:xj+VGMOtEvwDpjubEgV20Dd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_4d8f35d1a4247b0ff2b89639408b012c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections