General

  • Target

    2024-01-10_5fbd4451322412308fb8b79c6950f808_cryptolocker

  • Size

    115KB

  • MD5

    5fbd4451322412308fb8b79c6950f808

  • SHA1

    e90a49a37ebfc69d451586e70a233fc0062f4751

  • SHA256

    318ff639ab828e5af8a94123376317d3dd512089fee49936b2fc1986c0f148b4

  • SHA512

    1fd2ea690d0dd6d88d8d2f03e9d8d678f8caa2326c6a8da4f9162da713f8dd6d53cb350b42b3fb3655c1af2171d9e3a39278ebb23856e8edcdd21e503fcf5426

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/2:T6a+rdOOtEvwDpjLzb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_5fbd4451322412308fb8b79c6950f808_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections