General

  • Target

    2024-10-17_4455188752e0222e5af0021a4467d3f6_cryptolocker

  • Size

    84KB

  • MD5

    4455188752e0222e5af0021a4467d3f6

  • SHA1

    6a1d7f074d706e882c0c98fc852f4f228dba0aa7

  • SHA256

    ef139c279eab32831dfeed338aa790ead7003def8a72e83786f622431ad8d104

  • SHA512

    6115272ada166a8ed83a4e92f6edaae90eebbcf42b2514197f7d1fb33f037e00b3d189a179c9af7773f9d8b30041868feb020d4772ac3c25bafb4be65399f6e1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMg:zCsanOtEvwDpjy

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_4455188752e0222e5af0021a4467d3f6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections