General

  • Target

    2024-10-17_370296325900d633369e3a9c51e04b77_cryptolocker

  • Size

    70KB

  • MD5

    370296325900d633369e3a9c51e04b77

  • SHA1

    2b61e5a3e375c01c137a11bbd06e6688d409155b

  • SHA256

    27b01f612d6be669051dd753f873e2ea1644f19fe3651008f8a21d3ce028b879

  • SHA512

    70cf9ee2412c4fbcfd94790845e59a44fd9eebe64f5e7755efe4874ca296595120fc3cf574b363ac3446c72d247ddd564a2c399f3548df1a3d536e50a935ffa5

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+8x7l:z6a+CdOOtEvwDpjQ7

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_370296325900d633369e3a9c51e04b77_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections