General

  • Target

    2024-02-19_3353592e0c47ad0b1dec9f7d149f1bdb_cryptolocker

  • Size

    40KB

  • MD5

    3353592e0c47ad0b1dec9f7d149f1bdb

  • SHA1

    4cee42b36dc7d9c93eba9a44316d0a3078d1464f

  • SHA256

    2d76f2ebc5ed41beae9dbf56bf63e15137aa5c1aa1db30940cabecdf88be3d64

  • SHA512

    66fca180b7f1e716d883964a3f2781511d0af6b72a6a3f914d67f41590048c3b839149bfae25d311e5a25e09d3a0c42ddb0612820c8f9edfee4897c5c4b7cc0f

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/CtXM:6j+1NMOtEvwDpjrR2XM

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_3353592e0c47ad0b1dec9f7d149f1bdb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections