General

  • Target

    2024-02-20_4d8b314e6de3f6c8da88cec481f370fc_cryptolocker

  • Size

    96KB

  • MD5

    4d8b314e6de3f6c8da88cec481f370fc

  • SHA1

    d6d64c938e6594a7e033d12e08caa0449af1f9ad

  • SHA256

    a9c892756a45093c10c83864eba5aff81a7ba952548a425806d1ebea0c0457e1

  • SHA512

    403aa56b40692d3eaefdaf109945a8aa250bd3cc8e3c0de11f931fd82a33fe1bfeaf117d2ff3dded4f57dd1ab2dff99a4e274d0f0d4ed577284174f7e6dc7e25

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZ7uyA36S7MpxRiWNa9mktJvfT302J:xj+VGMOtEvwDpjubwQEIiVmkf08

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_4d8b314e6de3f6c8da88cec481f370fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections