General

  • Target

    2024-06-11_c6d4be9807ed05f34d779cb3b9dd274c_cryptolocker

  • Size

    43KB

  • MD5

    c6d4be9807ed05f34d779cb3b9dd274c

  • SHA1

    5a136d310561e474c29a082668c485262925d288

  • SHA256

    754c3006641f6b982b543ac4f2679a8b1cebd0edd30d04e802b487bfe81dd668

  • SHA512

    c54f934d2e399e742cd4c751b878739dfae559f0b4a92a4ca6116831285b455ee8ca19d835c97945f13401065439224b7e54418d9c646a4b86b9d36ff0438fd7

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpj66BLbjG9Rva/yYshNhS:i5nkFGMOtEvwDpjR+viHshNg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detects executables built or packed with MPress PE compressor 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_c6d4be9807ed05f34d779cb3b9dd274c_cryptolocker
    .exe windows:5 windows x86 arch:x86

    e021c9fc2c12265365fad587d43783fe


    Headers

    Imports

    Sections