General

  • Target

    2024-10-13_d55c37130f8fa81be29d19a50c6eba04_cryptolocker

  • Size

    53KB

  • MD5

    d55c37130f8fa81be29d19a50c6eba04

  • SHA1

    d1fb8dc5aa075ca19d335ff53082229f4a6ca3bd

  • SHA256

    df04e4724e0273b57287a8b27acc3d756040610a851e617c541d9269824172e4

  • SHA512

    9781ba1e4a62ef4bbe896f6597287c5b50dceaa651024a8e0c239c064e6dc06f1107c904a91ee9f5ff1f598da095d911b78873ffb09ca25f170f371170504726

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOogBg:zj+soPSMOtEvwDpj4ymg

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-13_d55c37130f8fa81be29d19a50c6eba04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections