General

  • Target

    2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker

  • Size

    82KB

  • MD5

    fac964691c02085ca0ca3e821e0b38f9

  • SHA1

    d4fce9daa1f0c2134cff53fcc83230b67f6cd417

  • SHA256

    2659d30fe3bcb2cae7f769e0d6f238309124d8d317dc6a583e5f7a8fd95debbf

  • SHA512

    e314d14a815f523e9b17a2bdfabd27df18107e3559d873672309ad711755bc4d00715292d304ea3ccf1e3d9594fa403b5bfb9196ceda5ba59ba9aa3d5bbe5979

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qu+:zCsanOtEvwDpj9

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_fac964691c02085ca0ca3e821e0b38f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections