General

  • Target

    2024-10-13_04ef2cfbea45e5c7142d427899d080ef_cryptolocker

  • Size

    60KB

  • MD5

    04ef2cfbea45e5c7142d427899d080ef

  • SHA1

    ce0dab52080c33c37e49b98b82af66dfca2f538d

  • SHA256

    b57e950ca5e8aab1b41f30e8f8d475490a23df4ebf48b8e5e86babed067fc5b0

  • SHA512

    9dca3270a521dc56893d6e6731acf29c7a15d13cd3dc505744407d759d872a172a29713fb38fe3f387e1246b97711c38c56b8d604cd974037baff213078a5530

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+Nx:z6QFElP6n+gKmddpMOtEvwDpj9aYa6

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_04ef2cfbea45e5c7142d427899d080ef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections