General

  • Target

    2024-10-18_1d4def5b823aa6b2e57099818ada4218_cryptolocker

  • Size

    62KB

  • MD5

    1d4def5b823aa6b2e57099818ada4218

  • SHA1

    cb46d2399a27a76f6942b36e46cbc49a7e691d81

  • SHA256

    da9a041484dacfe8e9e1fb44fb27eecf3e1815e7b49c0de158019b97a44b0c4b

  • SHA512

    cec968c6c3369eafe5fe08c7657ef69c785d31ef528c55acc962bd3425af159dfc4d286afdc7353a685a04fb28bcf775455c041e7f6ee008de74af1cf47e17b0

  • SSDEEP

    768:f6LsoEEeegiZPvEhHSG+gz5NQXtckstOOtEvwDpj/WaD3TUogs/VXpAPWRid1:f6QFElP6n+g9u9cvMOtEvwDpjnpVXzR6

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_1d4def5b823aa6b2e57099818ada4218_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections