General

  • Target

    2024-02-20_41a1f7b19f2bfe412947847e4ceb410b_cryptolocker

  • Size

    40KB

  • MD5

    41a1f7b19f2bfe412947847e4ceb410b

  • SHA1

    d4800b002e5992ca58c23dacef0e02f3ae0b1864

  • SHA256

    3080dd27f7b6a8931ce5c23d765dc05f94730fd44cfd3909d3eea3cdfd631fd8

  • SHA512

    fd48418304562f7d9656212504c95d037edcb286cc52f77edfb7bbc646962ef9ff12ea000cb47496fd319e45bcae539dbb2673deab35aac1e2afffd82d7dc828

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/Ct6L:6j+1NMOtEvwDpjrR26L

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_41a1f7b19f2bfe412947847e4ceb410b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections