General

  • Target

    2024-10-12_1c52e2a0f90ca52c13688f653ff67cf9_cryptolocker

  • Size

    59KB

  • MD5

    1c52e2a0f90ca52c13688f653ff67cf9

  • SHA1

    d5606107a0f8978ea533ae01bc7ec91d2d8764df

  • SHA256

    d81177bd91c66f55b25d6e44193b1c05579c6b9309fc6971a5c744e178ebcefb

  • SHA512

    fad8cae9474bec863ffd55ad560370d9c6b1c4921c8ebcaf2dd22d25a9a9309143c69406f0883cb95fb2b790804be2b7d38068b76ad81cd2b24dc3d4c4df00ad

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcSU:bP9g/xtCS3Dxx0Y

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_1c52e2a0f90ca52c13688f653ff67cf9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections