General

  • Target

    2024-10-14_4e217bf30289c8d7811774689fa0a959_cryptolocker

  • Size

    68KB

  • MD5

    4e217bf30289c8d7811774689fa0a959

  • SHA1

    d1d4a81c6f36e600ff7ed79034b40ef875b42a68

  • SHA256

    c6f375df27b27f1980ef45ce44279c0f7d7d081e66052e53e299ace2b4fc29a2

  • SHA512

    39fbabfe67df754bcb44411298863403744c8ff93c5bdc7ff895a3594f0bbb6a12e7b9fbf48aef2c4171c55b738d12219b271c089029b289341dc8357d42f173

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBC:z6a+CdOOtEvwDpjQU

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_4e217bf30289c8d7811774689fa0a959_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections