General

  • Target

    2024-10-18_545c4b20d9701765547c2e0dc037edb4_cryptolocker

  • Size

    84KB

  • MD5

    545c4b20d9701765547c2e0dc037edb4

  • SHA1

    3cabdb07603fa5543694aec4e679da92ab8cbb2e

  • SHA256

    c7c53a27f78c24999d2c479062e0c606796e54b92d45c50174321e37b60f6bd5

  • SHA512

    72291f8c3f6aad573c1d3934808f77d26228d84e1b31c1ba64f1f80c1b9c716bdba0debfb63ff49a99536ac1a2ce7048b071f61fcc3d3c33c4c134a710caf657

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMOL:zCsanOtEvwDpjS

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-18_545c4b20d9701765547c2e0dc037edb4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections