General

  • Target

    2024-10-14_22c20344e984c90cdb008810b86b4d30_cryptolocker

  • Size

    71KB

  • MD5

    22c20344e984c90cdb008810b86b4d30

  • SHA1

    e3b3960d602b2a52643c05c9c550fddc2d65c7f8

  • SHA256

    ed2d9ad1c2d2ba51e22ea32f4ba8fcf775eb3281a9f9829c61bc6767d188a632

  • SHA512

    a742910e27cd49fdf8add4366f3b600023f870ee87b3f864cd10aed5028334cdc99afeb78b881b9f46a89d924c35d071288c3fc2a4dcf0f88998c5700968a9cb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQb:T6a+rdOOtEvwDpjNl

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_22c20344e984c90cdb008810b86b4d30_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections