General

  • Target

    2024-10-14_7dccccb01113015d9e3f9a3eeed12f12_cryptolocker

  • Size

    60KB

  • MD5

    7dccccb01113015d9e3f9a3eeed12f12

  • SHA1

    de1dd6c8ffdf299ac9936790adc6532ecfa52390

  • SHA256

    c640657b30a98153c3ab93eb3f694a74d40c8aea8596ed4b19b44c59a9bb8b2c

  • SHA512

    16fcfdfc26384bd510156384e07b517060fae059659b98d34cce80f6d99db0a67bf001c38895cc26b991ed0dae863f5014730e4857221327e9dbb59f9331485e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+Nb:z6QFElP6n+gKmddpMOtEvwDpj9aYaM

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_7dccccb01113015d9e3f9a3eeed12f12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections