General

  • Target

    2024-09-28_1d1e3e7ef1ca951706d2ca6b06523b23_cryptolocker

  • Size

    90KB

  • MD5

    1d1e3e7ef1ca951706d2ca6b06523b23

  • SHA1

    fb1c8ee864f32703b20f75f2bb697bcbe218a13f

  • SHA256

    96d715c246f4b5ec5bf8b860adf0d7ffb6bacdced71eb776718f30b91f313f28

  • SHA512

    ad1e95ddaba3d6b06ac62877b0274fa76690d4efb836f377dac5c210dfe70c0b462bc22eff44e0c867f8c414baa62e9dea4e276559a48b48aa2f99be899b1cc7

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAl:n6a+1SEOtEvwDpjYYvQd2Pl

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_1d1e3e7ef1ca951706d2ca6b06523b23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections