General

  • Target

    2024-02-17_4eb9e59d7c27a69fddc83bf1edaf1a13_cryptolocker

  • Size

    39KB

  • MD5

    4eb9e59d7c27a69fddc83bf1edaf1a13

  • SHA1

    6290dd2fc1fb24a1be5e2d615f09b02bb37f154c

  • SHA256

    27d3322a155efb7fa886101738fae3fdf73ab1bed5e95de3f0dea3e67e380e09

  • SHA512

    91909074e22e204fd8393d837f880701b830714765622f42a7f3d624760d2093887daa64a93d98da6b07eb40bb7762d81c79c08d0e9742359da816caabaed197

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqhMx70:6j+1NMOtEvwDpjrf70

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_4eb9e59d7c27a69fddc83bf1edaf1a13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections