General

  • Target

    2024-10-02_9cf82ecc22003d0407514456eadb173f_cryptolocker

  • Size

    47KB

  • MD5

    9cf82ecc22003d0407514456eadb173f

  • SHA1

    e68b96c73f09381d37b294c467be0df5d77356d5

  • SHA256

    af4dcfec13b7cf5b6e3547bf49ef7d651bea4d88526bc9e696dea570e315e67a

  • SHA512

    668bd953f44c1bf7d649927c54d5fe2e24992327b5d0e8e167a83339090ebc4b4f9e24b3cf44f4a8008c90cc1c4f6c7848249515e5805b520098b18818212b7d

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqOsy:bODOw9acifH+Y6

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-02_9cf82ecc22003d0407514456eadb173f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections