General

  • Target

    2024-01-11_48e076d5bc597a945da4f48f4bca0baf_cryptolocker

  • Size

    61KB

  • MD5

    48e076d5bc597a945da4f48f4bca0baf

  • SHA1

    7cf5a1c3da792f7968481eea32f5efa30a51047b

  • SHA256

    8fc6e9d993431519080a4e23c53d069939c0a7a7502c6735c89751a75ca07722

  • SHA512

    1b9a5c0022d043a3e74d8089a89a6f59aa8a64900e85e51732da58e0f9bd8e055c7b4eca13356b869b99444a7445cbc46b510a6832665159bc346dc7043b3473

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5+Sqb:T6QFElP6n+gxmddpMOtEvwDpjwa3bqb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_48e076d5bc597a945da4f48f4bca0baf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections