General

  • Target

    2024-09-19_c1caafec348b3c8fd9cee2c467cd16b7_cryptolocker

  • Size

    69KB

  • MD5

    c1caafec348b3c8fd9cee2c467cd16b7

  • SHA1

    55beebd919d19e6ca88153543fe2264943019400

  • SHA256

    2abe8d6717de7cd6ceeb3421dc7d02674b5bcf61c8b0efd945a41e36ef5be029

  • SHA512

    c1f2078245d4e05db0f02e9358ef0cc2ba2ca8ac4291f123941d250e9b75294fdf5adb9a20d741bf5cd0beff175d92513571069a12280e4f1f91406c08643d37

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTJk5asCZ9:T6a+rdOOtEvwDpjNt

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-19_c1caafec348b3c8fd9cee2c467cd16b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections