General

  • Target

    2024-10-02_b20a590580314b855d549ee375523a77_cryptolocker

  • Size

    46KB

  • MD5

    b20a590580314b855d549ee375523a77

  • SHA1

    aa90b601c859445c5238aa8028d5a37271474b27

  • SHA256

    f6571b25044b8d3d2a9e03f02f92076993be8f34d32379c3d1d563ae2a3bd6db

  • SHA512

    d2d406a18aab1573a1ed7c77c825a0210f6d2961f56c4c88a71198397439541c4587dd61b01511802300eeb56edbd06363937d7cbc233d035820072b2524dcd3

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqOl:bODOw9acifH+Yq

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-02_b20a590580314b855d549ee375523a77_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections