General

  • Target

    2024-02-20_417edcdb1a3d4f02a90ebafd3274e504_cryptolocker

  • Size

    93KB

  • MD5

    417edcdb1a3d4f02a90ebafd3274e504

  • SHA1

    f1e1ed53712d5d0a5eeea0e6e593ea8c9e74e68c

  • SHA256

    32b7581c481f84275041612a556c68a7e5029596b1db0ac465a327489b8701ff

  • SHA512

    146b5f8275ceb909977f3a51feb681500e2636b287c18f4dbe6ddb78f7f7e2525e9d109cab1debe8bb29e24fdbd652bde0e4dc99c31beee13cd47b2ac586cdde

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJyzT:xj+VGMOtEvwDpjubwQEIiVmkuzT

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_417edcdb1a3d4f02a90ebafd3274e504_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections