General

  • Target

    202405214f26203729e8b75dcb7fa88269997e52cryptolocker.exe

  • Size

    60KB

  • MD5

    4f26203729e8b75dcb7fa88269997e52

  • SHA1

    9802af3e4ab140739481f241ca6a881cccc27d2e

  • SHA256

    ce68b6e12521e3fdb126cba388e98b3ebeda44b4751339e57fb2a9a532af21aa

  • SHA512

    3084699a47f05f37d3b0d77da48aa181c0ee7aee70f163d54d19c78749f5b472873d003f4cad5b58e6c2fb804eeafb77d358e75924aa78b9dafa0b2c856e72ce

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaUf3I:z6a+CdOOtEvwDpjQz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202405214f26203729e8b75dcb7fa88269997e52cryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections