General

  • Target

    2024041422533a1aff8f9a128cca6bcbce7722e4cryptolocker.exe

  • Size

    51KB

  • MD5

    22533a1aff8f9a128cca6bcbce7722e4

  • SHA1

    060f52aeabe57069efd7ceac4e8bc8257ad53d21

  • SHA256

    da7379fd46b0b383f575cf9ad41d1d093cec8bf8fad85b788ac3dfaa6844e98d

  • SHA512

    af86656eec4e328f0f68383b2bc183ea712bb9465ff4d637d47cb150719b641948370b5b897fbf8b0b654626dd029d685617821cd005dda57f5a1bca7a167b05

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOZ:z6QFElP6n+gKmddpMOtEvwDpj31iZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024041422533a1aff8f9a128cca6bcbce7722e4cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections