General

  • Target

    2024-02-11_5a40b82f9ff22e270833c04ca631cc17_cryptolocker

  • Size

    47KB

  • MD5

    5a40b82f9ff22e270833c04ca631cc17

  • SHA1

    d316ae0667216f7e2a8f3d751702a83666dad9fb

  • SHA256

    6eac61c15f2c0768e83c931b496315a4d25490c470c294c08e04a9ac60ae9861

  • SHA512

    5f35e5f18188d45d4ddd1497c3fabb84e332bee432c9c8138881f43a42cdf8e9f18b7da1ffb50f24fdf26d4a5d036acb0ed6860273278e8e1c2e8b02db2abb9b

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLtldJQBgG:xj+VGMOtEvwDpjk/JQh

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_5a40b82f9ff22e270833c04ca631cc17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections