General

  • Target

    2024-06-09_739e4df5122d702a3072a1971faa9c9e_cryptolocker

  • Size

    50KB

  • MD5

    739e4df5122d702a3072a1971faa9c9e

  • SHA1

    b5a80bc403ecf717061097d60f8f88d33f5769db

  • SHA256

    bd1c0c08a29916882d226d51c6d78b718e8bdce6375ecf48d075e6440c5dc6bd

  • SHA512

    aacb22526b716d468ba86cb99e2589f495237d62d95b2c3363956b08f5457d63089f27d49255344b3cc6cbc42cb8f1440fddb616d3f6fce6aa1896e0bc0a81d7

  • SSDEEP

    768:6Qz7yVEhs9+4OR7tOOtEvwDpjLHqPhqlcnvhx5/xFRsAy:6j+1NMOtEvwDpjr8hhXGh

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_739e4df5122d702a3072a1971faa9c9e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections