General

  • Target

    2024-10-17_facb3ec4f408526e81c3547fe4a12e21_cryptolocker

  • Size

    67KB

  • MD5

    facb3ec4f408526e81c3547fe4a12e21

  • SHA1

    0fb0f0c65be78fce028afa78dde0e198e49bf128

  • SHA256

    2127eb473fea4f7dfc31c659f2d3ad43c209a69480b3d6600b4ff62f3c7c0302

  • SHA512

    e12caa070adf5e62d9c207088e4076a9880e7e6d34936a3ab52268eb5ca2332b553cee546a2d857c33b0a5a517f6e6607aabc5a1c9d5aa4f8197574e0d1ca37b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBw:z6a+CdOOtEvwDpjQO

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_facb3ec4f408526e81c3547fe4a12e21_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections