General

  • Target

    2024-09-13_a0edaa30e3b94c005d61c39f3b2c6f27_cryptolocker

  • Size

    65KB

  • MD5

    a0edaa30e3b94c005d61c39f3b2c6f27

  • SHA1

    f3e0c1f2127b6d7d21fd03c1ab6b671cae641e26

  • SHA256

    be90c4bb405f6d23d8f1b4eb11965d60bcbe8f00ac4f83597f92ebf40c8102a9

  • SHA512

    a8b315623b62ca2f28e3152c5fe76ad24ae99499a66e358303c5fb23885d22bbf6ef0d2d45f86c484cbd0ff514f9b09ac50d1568a7806a371e0546ba42698036

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UAXk:1nK6a+qdOOtEvwDpjk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-13_a0edaa30e3b94c005d61c39f3b2c6f27_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections