General

  • Target

    2024-11-21_60a44144da287649449dc1f8dd31413a_cryptolocker

  • Size

    52KB

  • MD5

    60a44144da287649449dc1f8dd31413a

  • SHA1

    1b493cb52e273ec41976aad80e77955ffcec87fa

  • SHA256

    77501e1668e9f57e3efa6286a4108205b34951f14cdcc33dc66462ed263c444e

  • SHA512

    e9bc1285aefe0ee5306ad0fe79459a586948ec9c7df351f15fdc22fba66a858915dcb2f1603a2fb72428b5146f4f48192ded170d00fea09431692a27e054895b

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpP+gy:b7/y28wZEjbnouy8G76iH/NLpfy

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-11-21_60a44144da287649449dc1f8dd31413a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections