General

  • Target

    2024-04-09_ff6a4d820ab6a2da0717a696b229b79c_cryptolocker

  • Size

    43KB

  • MD5

    ff6a4d820ab6a2da0717a696b229b79c

  • SHA1

    1179ab6b5e0badbef60e48af0c54fa40c1c25ce0

  • SHA256

    507b8aee1c1b0311c5f1ba8cb238f23ca2f1b7240179478507931aadecaf6da5

  • SHA512

    c30aefaafc945433274b1cad75fd945bcf6bab77f8f17609b085640701c718d9bcdfc7a979cca49e32bdd1ae075d20e39e1dd35c935d8b579e600cf5478a354b

  • SSDEEP

    768:TS5nQJ24LR7tOOtEvwDpjGqPhqlcnvhx5/xFRp/d:m5nkFNMOtEvwDpjG8hhXjV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_ff6a4d820ab6a2da0717a696b229b79c_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections