General

  • Target

    2024-10-13_4d8dc713f83002db64c19d7f0e8a2c80_cryptolocker

  • Size

    55KB

  • MD5

    4d8dc713f83002db64c19d7f0e8a2c80

  • SHA1

    ffa1c0838539d58e84dab26e83b2ac10d25bb9d5

  • SHA256

    60b247a0f4b66a102e31170005cb5d8884b4a8faee4435ed0e1029d795b33411

  • SHA512

    b5c9a5659e283710bd71d675e680aeb7e4d221925aa085f5ade8dfeff1baae05008576801729996cd964d08d908be7fcfb60531153692e05f37b3f79c790c31b

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPd:b7/y28wZEjbnouy8G76iH/NLpn

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_4d8dc713f83002db64c19d7f0e8a2c80_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections