General

  • Target

    2024-10-17_b7fa5fad4e835b884afa474083f8f1cc_cryptolocker

  • Size

    72KB

  • MD5

    b7fa5fad4e835b884afa474083f8f1cc

  • SHA1

    7b5ba7c3238d3e60498b36d3d870b0c1173ca13a

  • SHA256

    9cfa1d6a8422bf4e761f354cfc105c83791f52f675cd995fe6f5030dabaafe5b

  • SHA512

    5a05b599e8107a2f4f2e36b57d568c0385bcf7af7d1da505b49fe98791514fd6f8e117679620d1ba59a1396b38ebe77c7352bcf4f2223a68b74557020f676ec9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPRe:T6a+rdOOtEvwDpjNtHPE

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_b7fa5fad4e835b884afa474083f8f1cc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections