General

  • Target

    2024-02-24_a49cf38b73c808e4b3f30374807d41a0_cryptolocker

  • Size

    40KB

  • MD5

    a49cf38b73c808e4b3f30374807d41a0

  • SHA1

    de07e888ce7b2d37e34462d63f5676c6020909c5

  • SHA256

    e72c9daf079d8206e65345c786081f1022aa1383a93b12053c398fa4b760fb05

  • SHA512

    a9547c497fdd2bbfb09da801e429969cd64f410806bd555fe78e9ebd75c18446c77acb6866b31e39949b54384011f169279205001bd5ca906977fa32608722a6

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqh67/rq:6j+1NMOtEvwDpjrRbrq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_a49cf38b73c808e4b3f30374807d41a0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections