General

  • Target

    2024-10-13_23c9af97f7eb2838ea638d7f926571f4_cryptolocker

  • Size

    60KB

  • MD5

    23c9af97f7eb2838ea638d7f926571f4

  • SHA1

    73124ef2280ec3feb80d4db50dd18fda1edc5925

  • SHA256

    57e64a09268fe28e44cc64bca8933f67daf6918c28c399cb14d9e77e2c3d23c9

  • SHA512

    5229494fb1d54c4d8fda6fccdbda3a3c322252a56ec0e7c688d1f4d0d904e5fd8bb9f2e83d024a2b3359d69cf0a3131a3d4a45570d3dfb01d015a0fad3d5cb3c

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVVi:zj+soPSMOtEvwDpj4kpmeLmnni

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_23c9af97f7eb2838ea638d7f926571f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections