General

  • Target

    2024-10-13_54cc75b9e5c50a85622f53fe263dfc99_cryptolocker

  • Size

    59KB

  • MD5

    54cc75b9e5c50a85622f53fe263dfc99

  • SHA1

    b368733e6a23458e815cfe17e615745b2330afa2

  • SHA256

    cffe68d9b6df58f0a065aec807384d9b23a96e1605566fc270a4253d2de99cad

  • SHA512

    9d5c6c0da7c402e2210a0779fe3b6a1f48c88b6c8474b427112052536d6412ce065dc51a904e7b53e4883dfd5713429481e0133c409bf812655e239117a74f3b

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP6pW:H6QFElP6n+gou9cvMOtEvwDpjCpVXE

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_54cc75b9e5c50a85622f53fe263dfc99_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections