General

  • Target

    2024-10-02_4d6f0d6316e7c087544b817ec004eb88_cryptolocker

  • Size

    60KB

  • MD5

    4d6f0d6316e7c087544b817ec004eb88

  • SHA1

    f3f8e24f9f764be4d24c94e50f4de47157343c7a

  • SHA256

    023016993a8f6aa327039c1ac9e96a70d62086141320658d9898e7bafa938dca

  • SHA512

    72bbd5c56d0342e1b4b750be30d7d358076fe3bf7ed527ea6be0e6ecac7f8400d250e77f6d935f74c005fcb78385fa465bed95f294f0487f89ba11fa1f1ce684

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+Ni:z6QFElP6n+gKmddpMOtEvwDpj9aYaR

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-02_4d6f0d6316e7c087544b817ec004eb88_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections