General

  • Target

    2024-10-12_4160c9fc01174326152587735a0e0a34_cryptolocker

  • Size

    52KB

  • MD5

    4160c9fc01174326152587735a0e0a34

  • SHA1

    3e5a07cc65233b2d7415417f1fad36e1b71a1d03

  • SHA256

    0f9627632194e40a7755f3cb281d0931a3f0c21f13cf69d73b48b93f1b24ebaa

  • SHA512

    d62edadf961f60ccddcad771684dc5e395284cb40b2ee845525be7268d156efe62a308c45a5792cd1f96e20430d75db348cd0de1650b00f90734d90c4f437fed

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpP+Z:b7/y28wZEjbnouy8G76iH/NLpU

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_4160c9fc01174326152587735a0e0a34_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections