General

  • Target

    2024-10-13_bb0f123210d0a8ad3b0def553936bd0f_cryptolocker

  • Size

    91KB

  • MD5

    bb0f123210d0a8ad3b0def553936bd0f

  • SHA1

    899fe6e877cc0e48057630701b90252e1b7af91b

  • SHA256

    e8d723fc34dd87da1b5453a918387b893337b21da3ad8f7bef18d31781e2f779

  • SHA512

    ef822f73754537b46e1dd6ae69bbcd160756b9ab80df161fd48e39442ae53cf0d9668b73b50de12bbfd37e0a200b7bbf37603fbeb1bb6e0938fccc28038906a3

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/4:n6a+1SEOtEvwDpjYYvQd2Pf

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_bb0f123210d0a8ad3b0def553936bd0f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections