General

  • Target

    2024-02-17_30f8b41088e7a1814d717f5872031ed2_cryptolocker

  • Size

    95KB

  • MD5

    30f8b41088e7a1814d717f5872031ed2

  • SHA1

    fa895048296dc46e970a5b83ba62a21b87014afd

  • SHA256

    92eab467ea18171d2dd9353fdb49728449a1b5f93d127ae82156b72209d4e886

  • SHA512

    c4245cee1d164c7aac0ca692c4f5ee6b79e5eab8b18ef5decb8a53d597c19276abf513b054f08434f18ed2f476d523daba692fa89c742bb1fbe22c97258db4ee

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJvfT3XS:xj+VGMOtEvwDpjubwQEIiVmkfXS

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_30f8b41088e7a1814d717f5872031ed2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections