General

  • Target

    2024-10-17_ceae93359e264ca0d7222a11a523b1c5_cryptolocker

  • Size

    70KB

  • MD5

    ceae93359e264ca0d7222a11a523b1c5

  • SHA1

    fdbc336a34a21de443cd68a3e6fd216e58d26cea

  • SHA256

    a944adaaf86a6284957efc02ebf2d1d8be3207a73e05c0059c8747280d5c8a29

  • SHA512

    868ea312e06ae8ab6837efcc524300521d9e14c3eff3a36cd7d49f3780d0040152b550d7d85552129822486334e86be6323569b0414e3dfea9c250249a6e2eee

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+8x7c:z6a+CdOOtEvwDpjQO

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-17_ceae93359e264ca0d7222a11a523b1c5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections