General

  • Target

    2024-04-30_4bfe7addead7e5e340c64496d79df9c9_cryptolocker

  • Size

    104KB

  • MD5

    4bfe7addead7e5e340c64496d79df9c9

  • SHA1

    de1773498b81aff73391f0d5d2ee5269f00ad644

  • SHA256

    84ddecad5a9fe60fa2e769839de43571834a88d27c359fbef3347187de7397f1

  • SHA512

    db1050f1484f3fd0494d733997c75fba776c3c0ad5c9797c452fb3031a0fb4e9d1c6d2c37de0e65689a4558bc1c269b1d6d65d0ac468d680e2463581f11d7609

  • SSDEEP

    1536:xj+VGMOtEvwDpjubwQEIiVmkxv/r+Sc0f:xCVDOtEvwDpjD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4bfe7addead7e5e340c64496d79df9c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections