General

  • Target

    2024-10-13_1bc0db6e5a0fa905cdde04ed5cac25ed_cryptolocker

  • Size

    71KB

  • MD5

    1bc0db6e5a0fa905cdde04ed5cac25ed

  • SHA1

    b5b36bb7878097cdeaf05d958fb4a3a22343a9af

  • SHA256

    663b6d89df693285a0aa73cc0194889823995cc01248741c5f7215e5f9f69c0b

  • SHA512

    c1293e2b45e47ec9cc8e5ed3a9c15be36d701d5bbf04d5356c8c41e4d3376fd963ee1670a5ab2bdfef1eafae3b4684a43c954eed25a18a80160bef2ea70ccb90

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxP4:T6a+rdOOtEvwDpjNtHP4

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_1bc0db6e5a0fa905cdde04ed5cac25ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections