General

  • Target

    2024-10-05_56a976539307c4fbc6ca51a43991e614_cryptolocker

  • Size

    40KB

  • MD5

    56a976539307c4fbc6ca51a43991e614

  • SHA1

    d52cebcc31145779284c125d66b2a0452a9f5f53

  • SHA256

    6b705cde340f68b18849a3d8eb6e7d356dd52ff479eb2e33f3c9ba9a44bc3fa8

  • SHA512

    fac191157ecd39d2c8f1292f8656e70bf1c226cfb3c53e46a7ecb595c3c115fc00d32a4129c8192ddb4cb1a836ae6045840c0bc0c2a1ab816be6c0685f383ad8

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiK:qTJu9cvMOtEvwDpjppVXzRH

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-05_56a976539307c4fbc6ca51a43991e614_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections