General

  • Target

    2024-10-13_ac1750f2f862cc3126894a04593c56b9_cryptolocker

  • Size

    71KB

  • MD5

    ac1750f2f862cc3126894a04593c56b9

  • SHA1

    e38c17a1dfc9a609dd4b20942ea0d0d077b80cd1

  • SHA256

    69bafb52e3e1f4956a8a419d4b59aa2456ae1900fb6b8a7ce37919c9106de3c1

  • SHA512

    7791fce9a423f01ebc0efb300c9336cfcb5733f57f5a08feb3ebbccbe3eab049ab85e92cd5aadf300aa6067eb5b5e9886a1d2c0c6f035532881ecb9c186439ee

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQA:T6a+rdOOtEvwDpjNK

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_ac1750f2f862cc3126894a04593c56b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections