General

  • Target

    2024-04-22_4b43ea5a6e2db49086e153c95fb12900_cryptolocker

  • Size

    61KB

  • MD5

    4b43ea5a6e2db49086e153c95fb12900

  • SHA1

    583d9002215be29bd034cfc2d48b32b1fab3ad25

  • SHA256

    228965a058344074344cc9b6d94a1268402f1866b3e96f955c45c93ee27ce8c5

  • SHA512

    58b30b8f12842e75efdf5c4a165c64c9d84557f78ab0cb384e451b3556c24aa3a30a3159e3093f89f3cc27bc499340fe488e854e2a705cb3dd6bfdc1417751d1

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWfbZgBh8i6g7GoFwDFOX6:xj+VGMOtEvwDpjubEgywL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_4b43ea5a6e2db49086e153c95fb12900_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections