General

  • Target

    2024-02-19_327bfcbd21ca4f1b252b22d29981e9b1_cryptolocker

  • Size

    40KB

  • MD5

    327bfcbd21ca4f1b252b22d29981e9b1

  • SHA1

    4a40b65aef97728d456493890bdc90e24c742f93

  • SHA256

    f7010d55705a80227187434b2d7cb1969b819279a346c3b1df91b63d3ff39722

  • SHA512

    f8a9ba310a6fe93c395a6232946727df7f29a5fd2be9b691d12e18f530aa97188f6ce2122f5da63ccc5a1198c51037ae77e92f55467ac824bfe11dba443ae2ed

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOO2:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/I

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_327bfcbd21ca4f1b252b22d29981e9b1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections