General

  • Target

    2024-02-20_e4020f176572d1fb3b4e3292edb5cbaf_cryptolocker

  • Size

    62KB

  • MD5

    e4020f176572d1fb3b4e3292edb5cbaf

  • SHA1

    25c69048aacb45debe68e7e9006fd874f28d81d0

  • SHA256

    2cb7cff6c2eabb0f5adb05d180a253cf54c84b83af915ee4aa8d5e93315c401b

  • SHA512

    46333a6b95d06428b2374f1ad1f61baff05860750a4b141a36c33b49f5d4ccda8e901e66eafad3fb3f162ccdb11ca77548b759f37ce73c8912815225dcfb59d8

  • SSDEEP

    1536:Tj+jsMQMOtEvwDpj5HmpJpOUHECgNMo0vp2EMe:TCjsIOtEvwDpj5HE/OUHnSMt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_e4020f176572d1fb3b4e3292edb5cbaf_cryptolocker
    .exe windows:5 windows x86 arch:x86

    5c55d83b58dbc1f7154223c32a893074


    Headers

    Imports

    Sections