General

  • Target

    2024-10-17_f93371081cbab9f0c8a42c104e8e34a3_cryptolocker

  • Size

    64KB

  • MD5

    f93371081cbab9f0c8a42c104e8e34a3

  • SHA1

    be5c35c4d0458164d7f1e9d23f90e8cbb784638d

  • SHA256

    9823d472384b9b65bb05097063c5a43da02c3b9c15883e9eb06a6d528571cfdd

  • SHA512

    a9146b20c7da605f8708dfbbb80b892fa3bc7c7c3e75a88cc8df123d3100654421c5faf3d46e4f54b8111acd2cde72c2cc8a5a2d53b2fa93d5731eae5962604b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjQc9:1nK6a+qdOOtEvwDpj4

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_f93371081cbab9f0c8a42c104e8e34a3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections