General

  • Target

    2024-02-21_36cb930a295a8ef4bc42a71e2dd9020d_cryptolocker

  • Size

    40KB

  • MD5

    36cb930a295a8ef4bc42a71e2dd9020d

  • SHA1

    7794c0c4bc7261a6bf9048f10b54097448d72578

  • SHA256

    87280a756627e875fff5d6412ffc40e34421710c144051d1044e0e81a9e54016

  • SHA512

    920eda9a5ccf33197a1037b480f0d66dc5d5acdec2cf0ccc1210449fba840c9ce93cdda208fd6dc8cca98be3e2c82d751b10e9dde1da64fbb8a1ced366833a71

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOY:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_36cb930a295a8ef4bc42a71e2dd9020d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections