General

  • Target

    2024-09-28_4fd1bb90126023a5aebe59a5527f3bd1_cryptolocker

  • Size

    88KB

  • MD5

    4fd1bb90126023a5aebe59a5527f3bd1

  • SHA1

    e13cbd2a67df8e8a61200d76337b027dc5a17c64

  • SHA256

    77c72178bf9b4686ac27a1cc3557b13067e9a5be04ef9c61571a9234a74640ed

  • SHA512

    e27d7de7544b912873dc67239ae6c17a3ffb1b699c1f024692697a87645192c905ca4116ca63c15fa341c312e78e3b86d7f7cd2cf37f26158987d9a27182b9fb

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDGc6:zCsanOtEvwDpjr

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_4fd1bb90126023a5aebe59a5527f3bd1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections