General

  • Target

    2024-10-09_6c5f42a8049e8c8ddf092313f5a2d410_cryptolocker

  • Size

    65KB

  • MD5

    6c5f42a8049e8c8ddf092313f5a2d410

  • SHA1

    c888c759ca16f2bdc22c03611e893537a53ff6b0

  • SHA256

    0ed250c9f66b2ed213895a660962d672dc81f86b270cbc10a75477fe84295e08

  • SHA512

    a7654b1aee2bc8b61ecaac8cc6b5d78ce822a875cdfc1873895887532be594269c3e034f5f283b19c7b47cc7db46ca5c6e34d7a2641b9162978a9c7d74382cc2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoF:1nK6a+qdOOtEvwDpj7

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-09_6c5f42a8049e8c8ddf092313f5a2d410_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections