General

  • Target

    2024-10-12_990ce9f2fd69c0c674dfc3a25fc409da_cryptolocker

  • Size

    59KB

  • MD5

    990ce9f2fd69c0c674dfc3a25fc409da

  • SHA1

    ab429f6453f45642f6dcb8edeaffd2b0d7a3b239

  • SHA256

    8222287e7bf1aa9cad1f0503541aac40dc7d1bd7edd92e54799f2b76bc0cbd67

  • SHA512

    4b8b09df61e1ccf36fee72b75d85b053565e2a76c99645ca6359462f6edc2944ed932df05759f7a51bdfbe992cd2b8a0936b72b3b9ea10fbe8794265ef679845

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcS/:bP9g/xtCS3Dxx0D

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_990ce9f2fd69c0c674dfc3a25fc409da_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections