General

  • Target

    2024-02-17_7a4b36e84882935709b31a5dd8b94213_cryptolocker

  • Size

    63KB

  • MD5

    7a4b36e84882935709b31a5dd8b94213

  • SHA1

    2803266d71193a8948ddc177c1ae3c66c7323c32

  • SHA256

    0ac34f31b8062d1a59207f107c0bd39d8ba1bed87fc895eff22901c878ff5d6b

  • SHA512

    1a3b87d7f94a176f6af3d52404d8094007564e6eea93ff8bd02ceaac23e42ceed1dbc70ac88a91263e8ac416d8b9d5ddd49060a09e5e2e0cc194b5856c2689d2

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEO10H1:6j+1NMOtEvwDpjr8ox8UDEy0V

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_7a4b36e84882935709b31a5dd8b94213_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections