General

  • Target

    2024-10-09_4256f13e6caffcf1c9b7b9a4e9deb361_cryptolocker

  • Size

    44KB

  • MD5

    4256f13e6caffcf1c9b7b9a4e9deb361

  • SHA1

    bf51e1c9e1f52e263fe6c6affd3e5191f908aaef

  • SHA256

    5b4207c5649f3d1d331869c58c0fb3265ea1ef4a27231be088726c87ac351808

  • SHA512

    a0ab9709172e514e9e8fbf2415a9e78a941de7f4a7eeeed4b5724ba9e1051d78bb608a0ac2fea9c585707b3dfdcd794ff695ff313ea752bfadc4e8ada1c63fbb

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsmHBdR:bO6YcA/Xk3wXFXSqAJD

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-09_4256f13e6caffcf1c9b7b9a4e9deb361_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections