General

  • Target

    202404143f42449df2220bce36da5e4b383eda66cryptolocker.exe

  • Size

    74KB

  • MD5

    3f42449df2220bce36da5e4b383eda66

  • SHA1

    d5f6dec22bbde8b3dcb32ae3ca6e0a259747cb63

  • SHA256

    dc042340b1c850c49cacebc387774c504c1be63f60dde9a90dd40ac3a88a006b

  • SHA512

    7c1f64149d6ffafe7878d906c3c5ed9ad4d7a80367794e272cac8eecb393d3101d7a776d46b8cb64bbad40dff9b053b2941752ea79675e1877b2c2ee7cf93bd4

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsaleFY:1nK6a+qdOOtEvwDpj6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202404143f42449df2220bce36da5e4b383eda66cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections