General

  • Target

    2024-10-12_44fda18e8522607148ba159698e89b7f_cryptolocker

  • Size

    58KB

  • MD5

    44fda18e8522607148ba159698e89b7f

  • SHA1

    7c71d1831817ca0b99d4ee3d2561b5048e16ff6b

  • SHA256

    a96f053596efe206d886f67f82b4a90ca2a97780c885c5745c36b2b43d8effc2

  • SHA512

    0c88391b1a2012d465977be68e779b7447fabe92a25c7c092d6125b6e747c1e4c968060b4c95096bb962315a1a26a5c23e47bf31139d30cbfc2ee44349830842

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlY3z:bP9g/xtCS3Dxx0L3z

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_44fda18e8522607148ba159698e89b7f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections