General

  • Target

    2024-10-15_8d1963e84b35302162d05e2ae4169f6e_cryptolocker

  • Size

    62KB

  • MD5

    8d1963e84b35302162d05e2ae4169f6e

  • SHA1

    5b985a36c1b1801ad0382e45d1d6e8b9c4c974fb

  • SHA256

    1e7d2a203450af1df0e620bdecd29fc4e524a50274460466294626f04c4132e3

  • SHA512

    5de718bf7d13d04c2a4ac585e0fc2dd68d4be4e078c4d7e26972d33d3795a312028579af578acc3edb447017a84727ffcbbebdaa2d4c6fe15ee0d4b86d2e1dad

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qho:H6QFElP6n+gou9cvMOtEvwDpjCpVXhho

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_8d1963e84b35302162d05e2ae4169f6e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections