General

  • Target

    2024-10-17_cf224d7c58886dd149c3f7e17d95f898_cryptolocker

  • Size

    96KB

  • MD5

    cf224d7c58886dd149c3f7e17d95f898

  • SHA1

    79c4a8dc4b1aac53aa6cb3b02c80aec56e3bd136

  • SHA256

    985e61e67df3b0091d59fddf061d3c6dc1e97d114cc7c82e795b857b850f06a1

  • SHA512

    5868b31e5407979187cad030806411c19566f3b02445188711033e58525f19ef64d3d713a06dfce2c2694c458721e8320dba201169fe276adf7ec76d5d39748f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/B7:z6a+CdOOtEvwDpjcJ

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_cf224d7c58886dd149c3f7e17d95f898_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections