General

  • Target

    2024-10-12_bfc58f1b6a89d1bc86d4b124661ffc24_cryptolocker

  • Size

    63KB

  • MD5

    bfc58f1b6a89d1bc86d4b124661ffc24

  • SHA1

    aeaf5a4d9aa7ed9625104b4306d6edb212e1f851

  • SHA256

    1fca9f87bb589bc8e8d01973d01b41d0f6adc9cfdbb66a6349a0cc28025778c7

  • SHA512

    7538bb8f9c58171124470ef3c62471eb4d4b95ac79275a3b0c2aef1f2d2aacfb39eff6d833a74fbbddeb639012ef3bd41b603e80faad37000599b140c6c9d2af

  • SSDEEP

    768:f6LsoEEeegiZPvEhHSG+gz5NQXtckstOOtEvwDpj/WaD3TUogs/VXpAPWRi+:f6QFElP6n+g9u9cvMOtEvwDpjnpVXzRz

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_bfc58f1b6a89d1bc86d4b124661ffc24_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections