General

  • Target

    2024-02-17_c4c3f12c0f3f3e2c29017c433a16321a_cryptolocker

  • Size

    53KB

  • MD5

    c4c3f12c0f3f3e2c29017c433a16321a

  • SHA1

    adeb758e8d777f5ae4d0fae92924c444c2ebc268

  • SHA256

    4156b7a77c6cd7b4f786906cb1c8e995979f1c8bcd71351ead62ffa3bd0a8d7c

  • SHA512

    705fbd22c8e179a42c68113bf0a5f2e7892e422482ec36053691424cd91884ad568ac1f6b55d570a747cb161e83795d4f69a44365b94284b1262b734aa4d7984

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QJz75h:6j+1NMOtEvwDpjr8oxEnh

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_c4c3f12c0f3f3e2c29017c433a16321a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections