General

  • Target

    2024-10-15_4a6bfd88b62a8ecad63bdae5ea8af0ec_cryptolocker

  • Size

    58KB

  • MD5

    4a6bfd88b62a8ecad63bdae5ea8af0ec

  • SHA1

    41044ed781b802dcf20879746c5676ff62d71357

  • SHA256

    b3328bb0f9b409bb03dfb18966cefbff4f44408d96efaacc7572c8dd049c1887

  • SHA512

    81db4cf18a8cf1af0f9ef080e5c7d8f47f20df028ba7b37f6cff2d21cc5d3496049fdd0209d1b74e16a7510bec3457e0aff0f790142858fa3673bacabe1e1e66

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYrl:bP9g/xtCS3Dxx0Lh

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_4a6bfd88b62a8ecad63bdae5ea8af0ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections