General

  • Target

    2024-02-21_613d4bf00279a5e198a51879b8637a78_cryptolocker

  • Size

    40KB

  • MD5

    613d4bf00279a5e198a51879b8637a78

  • SHA1

    35b5dd62d1bf452e956326ddd06cf9f0bea6e368

  • SHA256

    d593987bcd0ff3587347cde1b2aeba9c2692d6f72e490beedc45225cc941e963

  • SHA512

    ffac3cda7db1ff7195c0ff05399eec76188fc08796ed972c570159a0efb65968b0dcb6801965e438a58cb4b443cca43ef819690fcfcaaee1f7ae1046186b4ad2

  • SSDEEP

    384:60VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26aIIcVRYpetOOtEvwDpjqIGRmdHzOOD:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh6/B

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_613d4bf00279a5e198a51879b8637a78_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections