General

  • Target

    202404142a640bbd7f7d49fc2ac343d475806b14cryptolocker.exe

  • Size

    79KB

  • MD5

    2a640bbd7f7d49fc2ac343d475806b14

  • SHA1

    63e3e0cfbcd21f5d136819fb66ffe0f9ff094b69

  • SHA256

    b68e54b0efeb02b126bd0321ba7cb3a4caa565f9e5d3f17b92881375c6795e10

  • SHA512

    6c72d910dff00138c3bb2fcabd413ae65e9f70955e5d939e5683c89e3c1800c40d15290cb86c0e0976607b03779a2770937a411da6367e23893e7262adcbf220

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBde:T6a+rdOOtEvwDpjNtk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202404142a640bbd7f7d49fc2ac343d475806b14cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections