General

  • Target

    2024-02-20_e7c9b066184bbb788be059807ac7a51a_cryptolocker

  • Size

    100KB

  • MD5

    e7c9b066184bbb788be059807ac7a51a

  • SHA1

    b5042152cf498111655007380210f19505bde7aa

  • SHA256

    20ec28d3c1745b48d4e5cb6240b1a5627374f3889cae7f6197c4754a68727f55

  • SHA512

    7ab3cea5b87011c3fe9005444c3dcb71a7b583340b1fad30352c1bfb24d9e9eff7398cc8119a2b7cf9dcc1372f527d31c886873599d5cad71318423600a3119f

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJHlv/k2cAe:xj+VGMOtEvwDpjubwQEIiVmkxv/gF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_e7c9b066184bbb788be059807ac7a51a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections