General

  • Target

    2024-02-13_11911c19101016009e6dd60db40cc20c_cryptolocker

  • Size

    39KB

  • MD5

    11911c19101016009e6dd60db40cc20c

  • SHA1

    670cedf3fd32b3271ddc379d470df16d10d260c5

  • SHA256

    7b49999cf62d41a20196d9b61d2565652e5dd2d45a749110ea6661ccc5e0f0e6

  • SHA512

    c475517fea14390b9ee462d3b9e7671e91f8a4c65310e7d452022ee0e2d15e1bf131833212c00b40fea57b73e073214cd7f49f7b7aa1e677d1a35c049122e93e

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRY/3W:m5nkFNMOtEvwDpjG8hhXy/3W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_11911c19101016009e6dd60db40cc20c_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections