General

  • Target

    2024-09-19_cfca3d57c0918ceb93d9c290280318b0_cryptolocker

  • Size

    64KB

  • MD5

    cfca3d57c0918ceb93d9c290280318b0

  • SHA1

    6688fb6cab3728c79dbfd9048fb5aced82c1ca62

  • SHA256

    c401ed18eabe946fd400735ecfee56d3cfdf12cb57c5f7c04315a7b049735bdc

  • SHA512

    c385d95d3e7daf32946d758c9684c2333335b2a42ffab92e25f9bec5e597d8cdaa137dfe9b6a3991b5b6be0f344e93023fb51f73b9d56e051e7d57a1d9894c7c

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zF:0j+soPSMOtEvwDpjwizbR9XwzF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-09-19_cfca3d57c0918ceb93d9c290280318b0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections