General

  • Target

    2024-09-27_d1747fef541df3e4f872bde2555edb13_cryptolocker

  • Size

    59KB

  • MD5

    d1747fef541df3e4f872bde2555edb13

  • SHA1

    70ba3dac2a6bcc774f610a58b3f0f0e544a0ca56

  • SHA256

    bd65f0aa551f595181aa08cad53f8945d932e7177d94173010ac5ddf81d2dc70

  • SHA512

    2d5c79846842894d99b0b1ad4929799d6bcb38b919e07d3478b68e8903e4138718107545f7358c7a3765f8fe28221a725b10d158b61e8e9bf31ec9ba567e0ced

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcSm:bP9g/xtCS3Dxx0C

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-27_d1747fef541df3e4f872bde2555edb13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections