General

  • Target

    2024-02-21_4c4cb1c63d887ed055432259b16736a1_cryptolocker

  • Size

    48KB

  • MD5

    4c4cb1c63d887ed055432259b16736a1

  • SHA1

    743a340b9a7b18bc6c840e84646c4a4995b28cd9

  • SHA256

    1c180ab5fde84b9fcd2542d73484fd07808372aa905e27aeafcecb4a85fadf40

  • SHA512

    461d74cf0005de3bd89c3235507546e1df87bb6e847d4cdd4dc7484d187f2a499d002f5bf7aab0e1bc1f4b051edf589d46766161462795ec9676c0b99414cc9d

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvhx5/xFR5nq:6j+1NMOtEvwDpjr8hhXO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_4c4cb1c63d887ed055432259b16736a1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections