General

  • Target

    2024-10-04_41f001531154e37477dd4aab4a5a4df3_cryptolocker

  • Size

    59KB

  • MD5

    41f001531154e37477dd4aab4a5a4df3

  • SHA1

    21fdaddb1cd8879c467bab8fda3297588bd338e7

  • SHA256

    78bce28e105a2f39a6156e3fb70f5fcd60f440f2a3d780db6ff4f9c46d9f022d

  • SHA512

    727dd87053a6e587770cd9c056465ac0fc021c408fdbfdfdb936d71681435ae09c77f4bfd61ca2e2737b8688b7a4c52abc97452efec75e1f97cbf4a5311af61f

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+Nl:z6QFElP6n+gKmddpMOtEvwDpj9aYa2

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_41f001531154e37477dd4aab4a5a4df3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections