General

  • Target

    2024-02-27_69f0b74f4765a0660c218b74001410f3_cryptolocker

  • Size

    54KB

  • MD5

    69f0b74f4765a0660c218b74001410f3

  • SHA1

    97d1ee7a4090ef8aeaf73ea171c283404f17b918

  • SHA256

    0692a6e27cc927f0f22afcfd1c45595831773f13998c7171ca57baa3ca498b96

  • SHA512

    74a256167fc07a11b4b0487ef915b7d99de1df747ef9650f674376b4d5774414f2e50f68226d94675a6666a0fb03fe3bb67719dd31918f0d930493fab82d7727

  • SSDEEP

    384:x0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26a4rIcVRYp055TOtOOtEvwDpjqIGR5r:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbKC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-27_69f0b74f4765a0660c218b74001410f3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections