General

  • Target

    2024-10-13_d4fa7ca90628b49e4c9c318e22654f79_cryptolocker

  • Size

    58KB

  • MD5

    d4fa7ca90628b49e4c9c318e22654f79

  • SHA1

    836225aeae872ea11fc419b99a34ecaf5a5da320

  • SHA256

    375bacc06fd6f03487de9e097320c1c238ccbe537ca05fff1723ad393e5de176

  • SHA512

    ba58c8afe1a512c00af2cfb6c4ed29a729cb3ebef7e5d5c204223ee656193160959436e0e9b7cce123cbdd361f68c3f1166a5f88dd6b8338a943d1af519cd454

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYc:bP9g/xtCS3Dxx0Lc

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_d4fa7ca90628b49e4c9c318e22654f79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections