General

  • Target

    2024-10-13_779e4663a479ff79c70b0434a559c1e4_cryptolocker

  • Size

    93KB

  • MD5

    779e4663a479ff79c70b0434a559c1e4

  • SHA1

    d2b4c84bc9f410bbd62bc1749124508366bfa264

  • SHA256

    3f369c0da8f462938598c5a049928936c5fae56c0fd40a2df2ca43c005523753

  • SHA512

    cb982e88a1ed84882d2d7e967b9d326d5abe94ba8d4b22d5e733d5e3e43992d9558da9cebfb75f9c7285de4467e42d9d5e9a435cf349749faff37f98a482d1c6

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAeV:n6a+1SEOtEvwDpjYYvQd2Pg

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_779e4663a479ff79c70b0434a559c1e4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections