General

  • Target

    2024-10-14_5ecb6b1f9b345a63470671317179e3f8_cryptolocker

  • Size

    53KB

  • MD5

    5ecb6b1f9b345a63470671317179e3f8

  • SHA1

    88b8d5ac54094c215ed00cecabfb8ce4bbd5e2ee

  • SHA256

    e0bc8b27d9e3248d65e6b472344b5903d75010d7cf465096a5d49a60c74b63e3

  • SHA512

    575ef95e92585f6c5374db5630aa909e92d966f1d2b3e3156ecfb223b5860c6dafb9a9c258f1210c8b23c3dcbdd239a87f718759741598d1f7904420dde257a8

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOu4:bODOw9acifAoc+va

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_5ecb6b1f9b345a63470671317179e3f8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections