General

  • Target

    2024-02-18_813b03dcfa6914353b748733674b7a11_cryptolocker

  • Size

    54KB

  • MD5

    813b03dcfa6914353b748733674b7a11

  • SHA1

    3d3058d7b9f1b67b04425ebe31e5535fd48452e5

  • SHA256

    aa5290ebcb30a27f13d44e57525bbb950d8a5573ae148030ad756ffef7a487bd

  • SHA512

    e5e4ff6fb7abaeac76d74ccb996c79f2dc616ecf109c8831e660ae792f6670ae1442e7171f666d51df9fe77fc712f6616efb37f449cfaf7a906e0bab479bc024

  • SSDEEP

    384:x0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26a4rIcVRYp055TOtOOtEvwDpjqIGR59:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbKo

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_813b03dcfa6914353b748733674b7a11_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections