General

  • Target

    2024-10-18_990d6ad13f21b508c30c0faaef8804d5_cryptolocker

  • Size

    72KB

  • MD5

    990d6ad13f21b508c30c0faaef8804d5

  • SHA1

    35212a4a7102eae0c49f914fef5c318bb728c82c

  • SHA256

    cd51e1d1d01b31d40dd465f1b7d42da98a95f44b9616a6c4b9f3b6fe858e5cf5

  • SHA512

    d37f305f3a3ff52306695f6fffd67597aad78043044b8b04a5a11db5531ea9aaee551b1517169cc0d7fc33fa2a4be4905f3c67348ec67711ca87dab245329503

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPE:T6a+rdOOtEvwDpjNtHPE

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_990d6ad13f21b508c30c0faaef8804d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections