General

  • Target

    2024-10-13_4aba8fb49ad84dd8094d1282c9b39f97_cryptolocker

  • Size

    95KB

  • MD5

    4aba8fb49ad84dd8094d1282c9b39f97

  • SHA1

    fb3ad7a3515b4a1ecaf4f59be9ca5b22a6a52701

  • SHA256

    5e55fb838860ad56f515c05e7e53c93b2e5e8b28ff8791b8dfbbfe274353420e

  • SHA512

    7ce2c11e1cb7d81abe7d117be5e7e3aee20bea811a35103c1783c7c0ff11c30425b51afaef20602f9ab1696386fab8ca99925b56afd852a792216dc8ca8b66d0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kY:zCsanOtEvwDpjBL

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_4aba8fb49ad84dd8094d1282c9b39f97_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections