General

  • Target

    2024-10-18_42d7a508bd96addc096aca9e1868ae29_cryptolocker

  • Size

    58KB

  • MD5

    42d7a508bd96addc096aca9e1868ae29

  • SHA1

    4eab5781f55a31ace80b3ff7777c4a4968884c9b

  • SHA256

    93d1883d026be2a0ffc830c3a5254719983b41e60b787221fd887bda4b560058

  • SHA512

    1d2505f2632914de8d90c9346bb2a7cd605142ce3b7f57b45ad8ed65b5aa5e9bdb361b6314cfc47c7430fb0d6df845045c3a34a983381e9d22e7791db42552b3

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlY1:bP9g/xtCS3Dxx0L1

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_42d7a508bd96addc096aca9e1868ae29_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections