General

  • Target

    2024-02-20_4d00ab931f14a44e7ac0c32d2e27b992_cryptolocker

  • Size

    63KB

  • MD5

    4d00ab931f14a44e7ac0c32d2e27b992

  • SHA1

    c65e287ff79145c44b11943138469f6c1de4f3ff

  • SHA256

    85278bdea612b5880b7b298357fea6cdbc270ea30ede9113b3e47d64fe7c1a8f

  • SHA512

    29544d771a7b2b9f26387747e04dd0a5a4e9dc1b3d25017e11861b8ec0e01b3c1a82af8fc652457b228c8a88021db49fca3ea95897761f630ef84ca4b2f1e9a5

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5I52kGEMn:6j+1NMOtEvwDpjr8ox8UDEK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_4d00ab931f14a44e7ac0c32d2e27b992_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections