General

  • Target

    2024-10-13_e92b55d1153bb6116ba58659e27f6fc5_cryptolocker

  • Size

    54KB

  • MD5

    e92b55d1153bb6116ba58659e27f6fc5

  • SHA1

    9c4cd75196e2efa4e88740d462fa9e21836f20f9

  • SHA256

    7988050207580f19e72fb07ac65dfc7daee64e7fef17a3ae572d93a5743189eb

  • SHA512

    d11141a0668b6d0d63308e26d604a929c78abd80180f701ebe811d021e22d7a3261ce1bae0c701122e4d84368ac8f85d731a56fde57f78786c20f6857c1b75c1

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpiP1:zj+soPSMOtEvwDpj4y+P1

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_e92b55d1153bb6116ba58659e27f6fc5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections