General

  • Target

    2024-02-19_f3ab214b50c9b219ea27425de94cee93_cryptolocker

  • Size

    40KB

  • MD5

    f3ab214b50c9b219ea27425de94cee93

  • SHA1

    65ed2938141906bb3f1f8b7e033a9fbdcb60b9c9

  • SHA256

    7ddaae45dd74be14ed18b5b8ce6f9bc4e83879deb5ad355a80987112738409c0

  • SHA512

    ebc664708c1ec41bf5ee43f1aac54ed6d644e32725189fd9e8bfe17c7fe9c4aee1a4b2da6cf2e508d106a8a998dda46acfd3431551ae013f23ac7944fddaee2d

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOV:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_f3ab214b50c9b219ea27425de94cee93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections