General

  • Target

    2024-10-10_4b6391350c0edd3441476a3eec8a77a2_cryptolocker

  • Size

    62KB

  • MD5

    4b6391350c0edd3441476a3eec8a77a2

  • SHA1

    8030fc51726382e2b17478a360816d19dd223ffe

  • SHA256

    945f2d556da56d9801664bb8e41d05b57ebf28e5eca6f20ba9183839a805ec1a

  • SHA512

    932853f44eb84c6733d8561ff25611959b82c544c9724614277d174b16a2bd9bca2e05f6bcec55129d1e32e2f30eab0916ec5fe64c63936b4fcba037a16c59cb

  • SSDEEP

    1536:f6QFElP6n+g9u9cvMOtEvwDpjnpVXzRDb:f6a+1SEOtEvwDpjBf

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-10_4b6391350c0edd3441476a3eec8a77a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections