General

  • Target

    2024-09-19_0ed5b1a6fc54faac3ee725b631bfe12d_cryptolocker

  • Size

    68KB

  • MD5

    0ed5b1a6fc54faac3ee725b631bfe12d

  • SHA1

    891c81c356466a9ccfc1373c9afb57245e18ba04

  • SHA256

    23e471f766c1f5eaceb4409632133d2b1a722a0d6891a0bb394ae4b618870d19

  • SHA512

    de01f79ce4117417173fcf5c3ef1e9afada553004a781bf3b9220030384c44500a905dc6562068d59d0c772894d7137f7c064c8fc726c886dbc729b2c6c54348

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBr:z6a+CdOOtEvwDpjQp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-19_0ed5b1a6fc54faac3ee725b631bfe12d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections