General

  • Target

    2024-02-19_61273d29d918d5cac554fd990ae0c4b7_cryptolocker

  • Size

    94KB

  • MD5

    61273d29d918d5cac554fd990ae0c4b7

  • SHA1

    3991c18552a048b880805397e6d16f7368cfa5c8

  • SHA256

    706a83c4f66bee58b1f71818d0f10b10d3cf59329b0978a1337da42ccbeacdfd

  • SHA512

    15ffc7b95a2f2418e3c3b55c6e5e8cb855e33faf23e911872591e7bd255cbaeb41c6487b5bdbad6cb5e1752ceedaddc1d612dbeb40a1d9944a67f1ec510f408c

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJW73:xj+VGMOtEvwDpjubwQEIiVmkq73

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_61273d29d918d5cac554fd990ae0c4b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections