General

  • Target

    2024-10-15_f722bba2e0a3b90f581194653cdcb0bd_cryptolocker

  • Size

    62KB

  • MD5

    f722bba2e0a3b90f581194653cdcb0bd

  • SHA1

    e808f4015f427d7f25da4dc73e97c0f2b6a15341

  • SHA256

    df84c38e155ab9ca40a611088edd49e04183c1c64d66e968af8715a3fd1b0c30

  • SHA512

    f30b3b156391dcd6f3da0978cfcd5efd73e9af433f6457a544c27a8f775bcad9c2206233c284d4a2eb538c5eb6799f658a30d5f1dd0d2c2f4d797f4269264d9f

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhz:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhz

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_f722bba2e0a3b90f581194653cdcb0bd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections