General

  • Target

    2024-02-20_34cdeed073110c9f4f0e90fb63f582eb_cryptolocker

  • Size

    40KB

  • MD5

    34cdeed073110c9f4f0e90fb63f582eb

  • SHA1

    4d874ad05d01e5e34906934de98c410023d644df

  • SHA256

    9dd6e9f74a702e9eaff9486be2433e3da35bdc76f47253c0ca145aa7718bee2a

  • SHA512

    c0cb6cfaa77add9491c4ff6b24806b6c0533ca43ae7a83c0d779a05205dbb0d0284900b78b3f9af5fa5bff56e3e74e3582f9fe1e5c70469bc641aba9e67f951d

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/fM:6j+1NMOtEvwDpjrRHM

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_34cdeed073110c9f4f0e90fb63f582eb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections