General

  • Target

    2024-10-18_80e0d4792aa43bcd35795d3b406225b9_cryptolocker

  • Size

    58KB

  • MD5

    80e0d4792aa43bcd35795d3b406225b9

  • SHA1

    5f28430970b675b7a6f56530d1d3be1f478f8937

  • SHA256

    3ac423671a1f59641bde9f2881f6fb2bc64fe5a4929294dd51622cb9284cac3c

  • SHA512

    36a145b07ac0690c8dcd9dcba8a17bd1a6a2a4cc5fd2a9b436fd39331d08f8af350d73dfb7b8bae567b34eed7a0e90d67466786cdec16151991527dcb7042b82

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlYQ:bP9g/xtCS3Dxx0LQ

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_80e0d4792aa43bcd35795d3b406225b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections