General

  • Target

    2024-10-09_b4261a163928aed9c910439231117f69_cryptolocker

  • Size

    76KB

  • MD5

    b4261a163928aed9c910439231117f69

  • SHA1

    d036847cb12a876c8d2ab68ed45f7b787ad47e2e

  • SHA256

    3bc06550a862dec9dc2449541b106f560e5ce375322c71c47b490fa81633deef

  • SHA512

    04cac3c94a4c21571e5522f0b196805cd95fcbdd736b89a73172b82a6674a041c5e87ca554a204bfdbfd1a5d1978775248e3c41ba00a89592a7a1052b462802f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTzc+:T6a+rdOOtEvwDpjNw+

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-09_b4261a163928aed9c910439231117f69_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections