General

  • Target

    2024-10-09_439b8a1a10be7a5db34b252c14c6dd16_cryptolocker

  • Size

    58KB

  • MD5

    439b8a1a10be7a5db34b252c14c6dd16

  • SHA1

    512270071e1160584f714e2e24a4f887c46a8120

  • SHA256

    02609f7c84852fffb4805aa757cf24a9713c45cd9083e8d45ee3a21ded5aa410

  • SHA512

    a8eab746c0afc9f96b361d027afbcab58d70b37eef4043e66affb02fdab0af55c2e241bf45a37f353bac9fdc75e2cb7749d2a27a2990c35aa83c5f8c73105549

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYc:bP9g/xtCS3Dxx0Lc

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-09_439b8a1a10be7a5db34b252c14c6dd16_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections