General

  • Target

    2024-01-01_5f0a6afa1e20ff2f385e2311c6aa5541_cryptolocker

  • Size

    60KB

  • MD5

    5f0a6afa1e20ff2f385e2311c6aa5541

  • SHA1

    cb542d2dff19eec386b6c7f81be80d42d35c0077

  • SHA256

    841020ab9bd7d3c4439914d49e6de81a4c107de31f677712d16ae9a6c8249dd0

  • SHA512

    54c556e3d0b46e3987af025fe9ab7bb92870cc3c32cc20f718b7ce668490c15cc764b9cae41c49670a4387f1475105081214a8c4d3cffb3dd20b6e29d9cfc521

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLUWL:zj+soPSMOtEvwDpj4kpmeLm5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_5f0a6afa1e20ff2f385e2311c6aa5541_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections