General

  • Target

    2024-09-28_fcba5bdedbed8d37b7fd2a3d08ac4ef9_cryptolocker

  • Size

    54KB

  • MD5

    fcba5bdedbed8d37b7fd2a3d08ac4ef9

  • SHA1

    43618782140c7126847df1b1d82924d067ba61ac

  • SHA256

    8e5b93996788a9babd81a15318371414ec49e12c8249284f2f9b57b596a21b08

  • SHA512

    01a827b192ae041bea1137fcceab0c0032ba4f4446fec860985af127093bf28148bdb13bae400918435d276379b6e727bcffc28c5c0db91b0856bff32c97559a

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPQ:b7/y28wZEjbnouy8G76iH/NLpm

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_fcba5bdedbed8d37b7fd2a3d08ac4ef9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections