General

  • Target

    2024-02-29_7f9fd8f6fcc9ef42375015e4fd2793e7_cryptolocker

  • Size

    58KB

  • MD5

    7f9fd8f6fcc9ef42375015e4fd2793e7

  • SHA1

    bf8bf4d7b35b299982b27cbe7d78e17a3c8cc0b8

  • SHA256

    796fe374e971799327a8191aa5320852c91cbf4941be3e0c4d2f80e361a3f6f3

  • SHA512

    5629be4334a847c5fa87995d88d3e45b12944445e0673c181cc8eeea5854a05726098d4d08ae3a2ab571bb38239e6b8a51783a9741c8a1234ca5165e1d7ebc27

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7GoFwEpA:xj+VGMOtEvwDpjubEgywEpA

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_7f9fd8f6fcc9ef42375015e4fd2793e7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections