General

  • Target

    2024-01-11_48c4b25f42b7d1f13ac47f98ee6a00c7_cryptolocker

  • Size

    60KB

  • MD5

    48c4b25f42b7d1f13ac47f98ee6a00c7

  • SHA1

    9c55d57b42d0261314b36ae68e97489da5a21297

  • SHA256

    a8b1ca978a80ad9abe06512375b5ba353ffe628ccf6cb3b849daa94668793b4c

  • SHA512

    089ca0ceb0b9deab85425fb488019daa73d2af98f8c7426227d74f90ac6a5bc0de9b58d05a928b2139ed11f2be89638145773c8d6bbb133e17d3bd2b2d272a38

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5ho:T6QFElP6n+gxmddpMOtEvwDpjwa3q

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_48c4b25f42b7d1f13ac47f98ee6a00c7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections