General

  • Target

    2024-10-08_aa4410ec489c1d49432683869db7c7a2_cryptolocker

  • Size

    83KB

  • MD5

    aa4410ec489c1d49432683869db7c7a2

  • SHA1

    413b60add64ce5dbdcdd26cf353f253ff73086a7

  • SHA256

    fbc3401fb6f73521271ff2edef3333feb64e435aa268e9b1d523a5056a776745

  • SHA512

    408d58017b6240d2bdaa812ec5b8555c430d2787caf827848e35044465d4db53108ebbc857f4e9d04a5f041aa6c7b0cb0985fa8de27bd2913c28e84cfef77340

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRB:zCsanOtEvwDpjE

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-08_aa4410ec489c1d49432683869db7c7a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections