General

  • Target

    2024-09-25_bed00225d857e225a783d60e815da445_cryptolocker

  • Size

    40KB

  • MD5

    bed00225d857e225a783d60e815da445

  • SHA1

    3a173793e36072a78688ae3df6cb07e5deb28f92

  • SHA256

    697676625d798d5afb9f753ce5ea922a96cec56f2d6191dd3318f2118b333c6c

  • SHA512

    b6ff8d6d63d1e7d243e958005d18bceb99776286578759a9ff193c828d76d13b15f11a47bf03853b13a37a40257fae40edafacac1d0f32e67c0c4010cf3b4371

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiA:qTJu9cvMOtEvwDpjppVXzRh

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-25_bed00225d857e225a783d60e815da445_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections