General

  • Target

    2024-10-13_9af4c5bd444caf4327262ccec2149f81_cryptolocker

  • Size

    61KB

  • MD5

    9af4c5bd444caf4327262ccec2149f81

  • SHA1

    45b6e6ac3807167568985efd3125c3cbbae0b45f

  • SHA256

    6824848f560c875d9b7f6067f36e0d784381c3c7d78316badf6f4aff91d34eea

  • SHA512

    8cef7486624ebf0817361e5969342232dbe3bd22ff8bd0cd26e25b9d103ffd7e7225e2b924b7e397f1b4a49d399585a9b7b850d329c492d09a6fb2fb9ad1d9fa

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUFHW:T6a+rdOOtEvwDpjN+2

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_9af4c5bd444caf4327262ccec2149f81_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections