General

  • Target

    2024-10-18_a4349ca22a7072f5b42eb58f9eee724e_cryptolocker

  • Size

    56KB

  • MD5

    a4349ca22a7072f5b42eb58f9eee724e

  • SHA1

    734ad829df1d77e60eb2e69cdcec468c9e11957a

  • SHA256

    eebdd8c20692c4e2d78464efc42458080efe69a27c6b4204418b9dabe99b097e

  • SHA512

    efd766412a2857178e7081cb2a8a9e18c7c33c7e9d12bbd2394efbc41584a7a39fbcbb60a2f1b24121f2278c161fb329286f2c67d13e64d01601e84468580a9e

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax8gZpVNz:z6QFElP6n+gKmddpMOtEvwDpj9aYaxLx

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_a4349ca22a7072f5b42eb58f9eee724e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections