General

  • Target

    2024-10-17_00ca9bd9f6e9fa0678afc8c6bed34f23_cryptolocker

  • Size

    61KB

  • MD5

    00ca9bd9f6e9fa0678afc8c6bed34f23

  • SHA1

    068c4d440782b62d827938eef7eff31a46f8f12b

  • SHA256

    6a166ba0b5cfb41d6dd68c275e7d2d2da1c22cb3a19f56436f40281a63ab4b62

  • SHA512

    f60e94b2e56dd3104a1dcaf4d033b3e65a58826cc41b7da8081cbba405c38e962e9bfba08b34ffc8ed596c31831164ed24ceb4689d36fe7aef08c8f7a5bbad0b

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jK8:P8mnK6QFElP6n+gymddpMOtEvwDpjY2

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_00ca9bd9f6e9fa0678afc8c6bed34f23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections