General

  • Target

    2024-01-11_49a4e5142f9c7e27863efb501ab85221_cryptolocker

  • Size

    76KB

  • MD5

    49a4e5142f9c7e27863efb501ab85221

  • SHA1

    4f5f008551da7fbd130ab8d0e28ee1e3c9a75040

  • SHA256

    8d528688a751388185a03468fe8453c128c64eb69d567df3621b1547a331a070

  • SHA512

    48b0b82e01a08ec9c6b63d3376ccd9af1de6535402d46ae4526c557c3b10df602ab9d440dffc4f711873667b32cfdc65d50557e24f4907044243c988db5955ab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdT:T6a+rdOOtEvwDpjNt1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_49a4e5142f9c7e27863efb501ab85221_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections