General

  • Target

    2024-10-04_60afd019f4b2a8ca6737f5345bcaba73_cryptolocker

  • Size

    64KB

  • MD5

    60afd019f4b2a8ca6737f5345bcaba73

  • SHA1

    593830ef2b3c581f565b183fece47c510853d241

  • SHA256

    ad81d9e97c7ea7c1a2a50cba7719f02a157d19a5914e81782827a3aae9d8f820

  • SHA512

    711122b1190a25f0650a801d9667075b1ff27d6e2fea55b316c4f498c43d62c22db25ef9cd81e88c3323be5a0dfbef3767a2eb21efe57c8e5453dcf20358a17f

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zZ2:0j+soPSMOtEvwDpjwizbR9Xwzk

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-10-04_60afd019f4b2a8ca6737f5345bcaba73_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections