General

  • Target

    2024-10-14_6c7c468feff22b294c7b364d13d14553_cryptolocker

  • Size

    91KB

  • MD5

    6c7c468feff22b294c7b364d13d14553

  • SHA1

    fa4f6cd64f94b68b9d2dd3a5fa874dc499ea6e19

  • SHA256

    10782208485c8b0f7c2c15a9cd36a1524a098db5196ce12e3fa92a88622e5e93

  • SHA512

    848c98f1cfb9c1775fcf34a87555d15d6adc8ee7edf0fb6bb040458a104ce64a2dfaf1d891697f3a8161c2a36b0a57055af44b5ddfd7d6f93d08c79affe1eb5c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RRb:zCsanOtEvwDpjq

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_6c7c468feff22b294c7b364d13d14553_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections