General

  • Target

    2024-09-25_56a0a1cf5c208e89b089a05d1bc86023_cryptolocker

  • Size

    40KB

  • MD5

    56a0a1cf5c208e89b089a05d1bc86023

  • SHA1

    0c3f48cd528da5d3ea65e80b4a7e0ce2183fbcb5

  • SHA256

    8947b3d454d4871773f7c1fbaade59ef408966d27751a3f3d3e070a09e2ed0cb

  • SHA512

    f354f1cdd21876931561838566f8b6e050b52fcfaad579bef124ba20cc9950f0dae28277e2aeffa00143ac20fb133da5fdb6dcd4dcdfef132373a0696ca1c3d8

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiT:qTJu9cvMOtEvwDpjppVXzRe

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-25_56a0a1cf5c208e89b089a05d1bc86023_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections