General

  • Target

    2024-10-02_9ca4ec56e007ee799dbdc923bc8596c7_cryptolocker

  • Size

    55KB

  • MD5

    9ca4ec56e007ee799dbdc923bc8596c7

  • SHA1

    bdce340ef6deadc45bc2f0af21028e06bb0be440

  • SHA256

    1849306d6ceeb80e99c9d6d1d0b9eb4862651d30a05a104f949d9f3ad8a35167

  • SHA512

    e6dc58868266e490dd0d8ff7d85002b60df8dda881ab4a93e3095492c4d8ba62cffd62df82e67a0955124a632483dbdd53b84c73f50069f6e34a6e46c8853292

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOk/9/:z6QFElP6n+gKmddpMOtEvwDpj31ik/9/

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-02_9ca4ec56e007ee799dbdc923bc8596c7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections