General

  • Target

    2024-10-14_f6b438a4cd7e7d6711ab3894ef97f502_cryptolocker

  • Size

    59KB

  • MD5

    f6b438a4cd7e7d6711ab3894ef97f502

  • SHA1

    23d04957b0b553b840dab3e683f5a54c43d4a19d

  • SHA256

    da29f16e30b40e3a865085bc2bea2b82b8c646b44e9b2ba024a9222868c143e8

  • SHA512

    e6df3fcff55e94f3e8583a20e8eda40d2b9b6270d71566588ad4547f1a136e4de805e9588952a0eef9b5e759998566e8f2cac3cc3033fd70fadefa192663edfb

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcSw:bP9g/xtCS3Dxx0M

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_f6b438a4cd7e7d6711ab3894ef97f502_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections