General

  • Target

    2024-10-18_49a9d67b13ccc7ac48ff5a4d1861bd58_cryptolocker

  • Size

    43KB

  • MD5

    49a9d67b13ccc7ac48ff5a4d1861bd58

  • SHA1

    14dc1a33e3f272fa6905bfc0aad765b1cb57a5ec

  • SHA256

    af776347c5883efe8a1d1cd9cc5a00fa0a3c09b7e730c54ff7b2679167e0c5b8

  • SHA512

    0779f24477cb03f6a14692665738bd053bd9c50ebf8854f418c889146b48ac20476aee19122b91b395c70db9eb632fe796aa967a9f7a5a5b60e4c5b18a7a5094

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsJk:bO6YcA/Xk3wXFXSqAJp

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_49a9d67b13ccc7ac48ff5a4d1861bd58_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections