General

  • Target

    2024-10-17_92ee91912f40a2ee745426b9472c1946_cryptolocker

  • Size

    87KB

  • MD5

    92ee91912f40a2ee745426b9472c1946

  • SHA1

    b8f74269a5b0a4effa2c46425ec3314e5eba13f8

  • SHA256

    7c11f183e692741016a23ac9f7df53a17c253adbfc350bc3b3ac10cd71666df7

  • SHA512

    957dc51aa94b84efacf4ea9d5eb3d0a2cbb2993df5528d3ad7073fa70a54bc7d595266eb94595835a62df0646fa59cd083f3fc221c7b6ec94bd43160c183b9a4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87d:zCsanOtEvwDpjd

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_92ee91912f40a2ee745426b9472c1946_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections