General

  • Target

    2024-10-17_5d5f1b1b6f8b34a1a70d3b5b34c1d2de_cryptolocker

  • Size

    55KB

  • MD5

    5d5f1b1b6f8b34a1a70d3b5b34c1d2de

  • SHA1

    98f385538f32bc730d342916e50163bbd6ee4346

  • SHA256

    a545cac21171f3cadf67e765aad29b453d4f025caf489a13df2fa3a7a2da1405

  • SHA512

    02902c4989c04d1936363edb8264f61af20d31276c4b650982052689f48d612362f64b2f398312f7b13fdbd1b5630f7be55b09d18e1874c9152952b6dc80c9b6

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpLh:zj+soPSMOtEvwDpj4yh

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_5d5f1b1b6f8b34a1a70d3b5b34c1d2de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections