General

  • Target

    2024041432cf24deb530d15f2c2432e63db2b799cryptolocker.exe

  • Size

    95KB

  • MD5

    32cf24deb530d15f2c2432e63db2b799

  • SHA1

    b77266e22487fc39ec5a4748157e636cb48da70c

  • SHA256

    687741a548f9cad6e49628003e1092359e099df1b0f296c848088cb9883b8df9

  • SHA512

    93a6dc58648f319b97e7820c4089d7b52df4c2d10701b13f4fb75a02e12ce24c39cc77670f1695dfbd8ae7032bab093a0f461e568d5e4c14e9c2e9682a60f5b0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bK:zCsanOtEvwDpjBW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024041432cf24deb530d15f2c2432e63db2b799cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections