General

  • Target

    2024-10-04_de4db0c42685e9c267b1a6a154b91422_cryptolocker

  • Size

    82KB

  • MD5

    de4db0c42685e9c267b1a6a154b91422

  • SHA1

    8d86d10e2325c3091b4d12e3f8f8d9c62c040263

  • SHA256

    4ef3ca4a6c7169a6ded56be30908b43f0774502dd3e3b303e48279a188c5ae96

  • SHA512

    aa05b9f38797707bef3b152294370395e5fe197a4bb6a80d725fc1f3fbd483d7bc21a270843a1e93cd10d4a416f9de843eabbb901d2426421f0c9e6e698bd498

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qih:zCsanOtEvwDpj2

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_de4db0c42685e9c267b1a6a154b91422_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections