General

  • Target

    2024-02-04_6df83e44d4fcc4d4f0a1045eb7365aaf_cryptolocker

  • Size

    53KB

  • MD5

    6df83e44d4fcc4d4f0a1045eb7365aaf

  • SHA1

    82d86dd8ee7c98090428bef345fdc25ee31e9013

  • SHA256

    e678dff3fb7343d4f411a85b97541061090421c61c765dab6cdd93265c3536d9

  • SHA512

    760b1d8168ab7c603c731969a21a09117c0dd5b04d71c094a4a3e152fccacc3f3d437d2142c5e683b593d6baa31bf695f5ea41b6e5f837846a8d60d5efee9256

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPOYRmNxt5QJz7y:6j+1NMOtEvwDpjr8oxEY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_6df83e44d4fcc4d4f0a1045eb7365aaf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections