General

  • Target

    2024-02-19_e53ed81fdb4fc8b7f321355e007c380a_cryptolocker

  • Size

    40KB

  • MD5

    e53ed81fdb4fc8b7f321355e007c380a

  • SHA1

    bfcdac2a3a9b105f72702d6b149ab9e58eb06368

  • SHA256

    fb7d01b30b54c663207b992e0211f8c0bd145161a466fdbdbf2f9de5461cc7c4

  • SHA512

    32c0fceafda2688af8bab4b8ad59744e42755a2ab044e8ee7864cc434fe0acc130244258fe54b352de4a104b4eba9df95af7bfe9893ab1fe77cee2374ec711e1

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOO2:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_e53ed81fdb4fc8b7f321355e007c380a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections