General

  • Target

    2024-04-09_4a091396f11ba46608324e5a20f6f3a7_cryptolocker

  • Size

    48KB

  • MD5

    4a091396f11ba46608324e5a20f6f3a7

  • SHA1

    42fb5bcff4f92cf28e61aa846c3bd0468343eaa5

  • SHA256

    39ddc30fd05b638e7e65030b6392a27c359d05a4600a54a3dde594abfe61a72b

  • SHA512

    c08dbe45fcca8784ab915f1b1aa95693283475ebc5453073748d4b806604d76ede79afac3255ba251bc1d8924f08d40081c53a34f1a92c19c970986e471cb805

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9RzhwaRND:xj+VGMOtEvwDpjy+TRND

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_4a091396f11ba46608324e5a20f6f3a7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections