General

  • Target

    2024-10-17_8faf7fc4e61d7c3f374b3265d4089e0d_cryptolocker

  • Size

    56KB

  • MD5

    8faf7fc4e61d7c3f374b3265d4089e0d

  • SHA1

    fec1ed21512b05a14a1ddc28fc94f322358547d7

  • SHA256

    1c08679556b0b239fc1cf57acf9abc9475349729d6a61121b083c0d77fb3bd2c

  • SHA512

    f772b6faa70f809a11e117cf3686d2ff38777c902426619bdbee5d2402b2415e795b0105d15a773734cf953e47bb0d90933b9566994c030a88e13c2742bac1c7

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax848+hIW:z6QFElP6n+gKmddpMOtEvwDpj9aYa7

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_8faf7fc4e61d7c3f374b3265d4089e0d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections