General

  • Target

    2024-10-12_13ea4f70f1374434219c0e28b6b81db0_cryptolocker

  • Size

    64KB

  • MD5

    13ea4f70f1374434219c0e28b6b81db0

  • SHA1

    adeed2515adad5b9c72757110d6adfa3a459895c

  • SHA256

    85481a986ba3e7916f3face462321854e454926a7a36574dfff9785484a5eb8a

  • SHA512

    fb5d123a1000ee33db35bbc745e4b0d5f8fb1b182d4122c906c13c65f498dabce253d741091f266bdb6795e052bd00cb5be8fd952f1bd12be5ef8e6b1285184b

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKv:P8mnK6QFElP6n+gymddpMOtEvwDpjYMA

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_13ea4f70f1374434219c0e28b6b81db0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections