General

  • Target

    2024-10-13_bde5e39aff9dba4980d9c67a72b4028c_cryptolocker

  • Size

    55KB

  • MD5

    bde5e39aff9dba4980d9c67a72b4028c

  • SHA1

    a21a95574cbe963ab8f4c56fd4201776e5274615

  • SHA256

    5a4ec8061f50a0dffacc27707fcb5b93d71c8d546549875347a848997fcbeb0c

  • SHA512

    d0354971cf4091f1ea2d5889ec73f0feeb661c634171a5edb8ddd3da1a92b1f09b0e19bcda18edc0fd3dfd62cbba65a99e84f639dbd3e00814d5b34a9a31c43d

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkVL:z6QFElP6n+gKmddpMOtEvwDpj31ikVL

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_bde5e39aff9dba4980d9c67a72b4028c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections