General

  • Target

    2024-04-23_299f07744f57e4bf478245b318a5c5f9_cryptolocker

  • Size

    50KB

  • MD5

    299f07744f57e4bf478245b318a5c5f9

  • SHA1

    6ecc947926b82db85be30e4366739c37a7a9a880

  • SHA256

    83441b3e7bfab598b1d9205b30ac6429cf8fcc14eab7b6d583a963a43889d34c

  • SHA512

    d6ae3ae89ddb8aae9ed221f8b7af0bc3a0f5cc6f570a16741a63fde739f5598b3657c21f0b8ba94f7ae89f0d077eee60d54d27e3e1f31f94857fb306df50fd2f

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvhx5/xFRHnzt:6j+1NMOtEvwDpjr8hhX9Z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_299f07744f57e4bf478245b318a5c5f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections