General

  • Target

    2024-09-30_d0fa647f8f228e79837a89d2e4450162_cryptolocker

  • Size

    60KB

  • MD5

    d0fa647f8f228e79837a89d2e4450162

  • SHA1

    aef93bdb69ba15bc7af24947662ff9f33753a37c

  • SHA256

    2a5b3140492c4c96961b6ad2adfc16e326d4da72e237921f1791025abe6885fa

  • SHA512

    224a01980d92ebcd1e83c3e8588cdb0d80e5c350854ef21a53ef6b694833453e7fa3437bf2e059c7099dbfcb332d792e9e4d89eadb06970fb230dcedd6bebffb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZ5ce:T6a+rdOOtEvwDpjNF

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-30_d0fa647f8f228e79837a89d2e4450162_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections