General

  • Target

    2024-10-12_4213ac97212d76ff68fdf9f3c78a3287_cryptolocker

  • Size

    54KB

  • MD5

    4213ac97212d76ff68fdf9f3c78a3287

  • SHA1

    656440a4550a939cfb2687a769ce0601ead85486

  • SHA256

    25dd8011b0f75c91f322cbf158fd097a1d6968d135209b678c4f0d8faa5ab5b8

  • SHA512

    48f25d0cdb92288819daa74a104c5af4e41e6536258c8fe20d553acfaed25daac760d01689f79f76da85a555e46ce3be74a3fc8948fab83a65559df2b0937206

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpiPg:zj+soPSMOtEvwDpj4y+Pg

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_4213ac97212d76ff68fdf9f3c78a3287_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections