General

  • Target

    2024-10-04_14c65f5e194587f56c0fa6e2b9b65f97_cryptolocker

  • Size

    55KB

  • MD5

    14c65f5e194587f56c0fa6e2b9b65f97

  • SHA1

    a97a367a3bcd7775c9e7409d96de0526b6e189d6

  • SHA256

    560b57afe5a12712ebf5ae0cd31fd36550519c236174dba53f55313a24240a98

  • SHA512

    8e7b3e13b0eb2e69538de43478b08c3dc9ca2636e6a40015c1709244baac6b13aef20c37ad862a155c246df89407fda065bad52fd70c88b5d49d9a6f66ddd836

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj31ik/9+m:z6a+CdOOtEvwDpjZ

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_14c65f5e194587f56c0fa6e2b9b65f97_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections