General

  • Target

    202405214fb43bcb11143688d9c58b2568dd1825cryptolocker.exe

  • Size

    91KB

  • MD5

    4fb43bcb11143688d9c58b2568dd1825

  • SHA1

    94d34575f4db67c000432aab8e2d0b258a84258d

  • SHA256

    a071d0152dd3d1c70fbd0bda77a417fac3e0e0238aabee71e1f49608777e10a0

  • SHA512

    6f120e74db92d733b02ea281853d1cde689e1a4569efff7bf5d2f44b5860c8ba7831cf2aefb8ea9da77968073b90d9eb0be5e4c69da508546533c0094cec72cc

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/Dc:n6a+1SEOtEvwDpjYYvQd2Pv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202405214fb43bcb11143688d9c58b2568dd1825cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections