General

  • Target

    2024-10-14_f9ba2fcdde6e9faa3f11a2969ffde59e_cryptolocker

  • Size

    54KB

  • MD5

    f9ba2fcdde6e9faa3f11a2969ffde59e

  • SHA1

    6e099f9058d16d2f598fded261c4f0abc7a86a42

  • SHA256

    6faa6cbe866f9a913ac489977898cd06c691ad11a285b458b2a045bb2293fe59

  • SHA512

    fd236543ffe8a09a20c45d0566306832bf3579f440f2422831207c77a4e79eed5bc9440e9d8fd33b4ff1e851105d80d330f8ff77d575a1335570ace630cc2bd2

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOm9i:z6QFElP6n+gKmddpMOtEvwDpj31im8

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_f9ba2fcdde6e9faa3f11a2969ffde59e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections