General

  • Target

    2024-10-13_58c7de2033cf9dc76c5232a40770dff2_cryptolocker

  • Size

    56KB

  • MD5

    58c7de2033cf9dc76c5232a40770dff2

  • SHA1

    fa796f798cf096229cbd8fa30bf2a9860f36cf6b

  • SHA256

    2df6fd9c1d6eea64df6142b2ce5f11d322931badd973c5cab6d33419a34f1fa6

  • SHA512

    16e47fdbc345e053db3b1966dc8a0f83c014f7d7274f095d8e4179bb3a1c2c974de2aa0ec23cc881658476dc3dff2bfeeef931d05031791b2407e7903d679b84

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc3xF:T6QFElP6n+gxmddpMOtEvwDpjwakxF

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_58c7de2033cf9dc76c5232a40770dff2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections