General

  • Target

    2024-10-01_f4dd9f891aa7cc6c9fce165a9d13085f_cryptolocker

  • Size

    59KB

  • MD5

    f4dd9f891aa7cc6c9fce165a9d13085f

  • SHA1

    1761115adab82949122ce23efe437bebb59e341e

  • SHA256

    85cf81765efe3d20b9ae0c888e2b366aa40607aa348f24a708b080787818445f

  • SHA512

    70f924aac3630e412a4cb2211053bfc7c0da6bacddec5e700f8328efcb282c4b61fc33f15f37886e0c90ae97e00813dc87b74ad12a7ab422d8ad565dac8a9746

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcSC:bP9g/xtCS3Dxx0m

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-01_f4dd9f891aa7cc6c9fce165a9d13085f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections