General

  • Target

    2024-10-10_da6a7f6cbb3346c274956360248f373b_cryptolocker

  • Size

    59KB

  • MD5

    da6a7f6cbb3346c274956360248f373b

  • SHA1

    58519044cc78f07ad8f0fc2bc5b84692e1df0bff

  • SHA256

    aa807e73c1792ee5d14a87fbcebdb0f5d7702714f42e6c9c9710a098035572d6

  • SHA512

    7abc5b504fa1b65cc667ad6da7bee450d2cba2c1c65413bbbab525d37549ddb178ab9369778461c557a4eae7b6530b69629f83e628051f9e283189494dc3e536

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcSQ:bP9g/xtCS3Dxx0s

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-10_da6a7f6cbb3346c274956360248f373b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections