General

  • Target

    2024-02-21_3d71516350c8fac9d5ae8c2e1cb6984f_cryptolocker

  • Size

    57KB

  • MD5

    3d71516350c8fac9d5ae8c2e1cb6984f

  • SHA1

    0a9f2d45d4c761315d7248c7a08f95b39214d4b1

  • SHA256

    0e1ea7f2cb559c6724d5d9277e5fb55df9b596ef5075036c0206cd423b741869

  • SHA512

    dff31014c38bd42e13f01609b8557a52e218683d7b1b7be7d987492854477b1d2b4f3d2d8018ff1143f5251c2191fd01e9096ff5ce4ed27ab1204e399369d9ed

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7GoFwAGZ:xj+VGMOtEvwDpjubEgywb

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_3d71516350c8fac9d5ae8c2e1cb6984f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections