General

  • Target

    2024-10-17_c39bc40c9aca5459a8f9c850fb3d7d17_cryptolocker

  • Size

    63KB

  • MD5

    c39bc40c9aca5459a8f9c850fb3d7d17

  • SHA1

    9850d0ed8c980365bcf59f5189e0ea419f7e6014

  • SHA256

    664fed069b71c8b70ce436d1938545e0a35992f29381c109eedd5b37114fc334

  • SHA512

    d026fa880a872a2651ca977976323fec6c26082610abcfd32bc6aea7864e67884a2f1255bec9b2f629c1f0e38513e2724b3de145af8c7344af3620f3525e86e4

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYjQcI:1nK6a+qdOOtEvwDpjl

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_c39bc40c9aca5459a8f9c850fb3d7d17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections