General

  • Target

    2024-01-10_0a933820a7ae58d97253bb3951fe44e9_cryptolocker

  • Size

    60KB

  • MD5

    0a933820a7ae58d97253bb3951fe44e9

  • SHA1

    69eb71ffaf83c788a69f6e834246b78178b89fa4

  • SHA256

    9a6daec4ff898561e819aed28ac9bc774675bf1ceb34c6a0ec0d9330dc0ea02b

  • SHA512

    b4089449d0aaa56f42854cba8688346d5d7d06b7570a88837338a36c5e4482908447e009a6f909ffc0948a38bc1f8cc52ba68823149992ef18304d36e01a5fe6

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J58:T6QFElP6n+gxmddpMOtEvwDpjwa38

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_0a933820a7ae58d97253bb3951fe44e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections