General

  • Target

    2024-09-30_1bd0cacb4e881d2b38d5855d635e5a7c_cryptolocker

  • Size

    47KB

  • MD5

    1bd0cacb4e881d2b38d5855d635e5a7c

  • SHA1

    e96f0df31c8653c24de189e1c50f6343bb596870

  • SHA256

    75d13e539a72c79aed59307d12a1e3a7b5f5af1197324d82027aba90a99bcbdf

  • SHA512

    1399c8cef630bc92b8a0565025a410f05b4c437c91d1313177935ee83a3a85346a082f429fa80ccbb21e9f87cecd18d532e099759ee87387abb57050716e56ee

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqO+:bODOw9acifH+YB

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-30_1bd0cacb4e881d2b38d5855d635e5a7c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections