General

  • Target

    2024-10-12_5aab77acb75af9c2c421aac80623d7b7_cryptolocker

  • Size

    59KB

  • MD5

    5aab77acb75af9c2c421aac80623d7b7

  • SHA1

    3cde577839b0b0ebdc0aa55b18b4e7a69fbed6f5

  • SHA256

    e3ba28b8881ca8e273331e0f96bfe94dbf896b3d8d5b1d56f1f653537d46fbf1

  • SHA512

    90a0a526aff2ba3c516330262f7786029f2c24fc1718ac40ee1192d4b3c4d623ed15a2c52b42b709a3607c8f3258272a17e4557aebd5e41cf8f9dfce979ec435

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6p1:H6QFElP6n+gou9cvMOtEvwDpjCpVX7

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_5aab77acb75af9c2c421aac80623d7b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections