General

  • Target

    2024-02-23_6f2a1e6e4520f090d2a140eb7b3d1a17_cryptolocker

  • Size

    48KB

  • MD5

    6f2a1e6e4520f090d2a140eb7b3d1a17

  • SHA1

    79dac3e924ab84de962390431a650fdb81e55078

  • SHA256

    0927b7a4378fa653f755cf57054194edfc4bc799eb470938cae5a90569cc96b1

  • SHA512

    015d099549978a904fa6c7ee323183b92d92b12107206cf6fa75c5e9b655d172a175e155f3aeee847d6b42e6e7e8df3384af42e0e050e8cfff2412eb017f3807

  • SSDEEP

    768:xQz7yVEhs9+4uR1bytOOtEvwDpjWE6BLbjG9RzhwaN9:xj+VGMOtEvwDpjy+TX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_6f2a1e6e4520f090d2a140eb7b3d1a17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections