General

  • Target

    2024-10-08_9a5153a5dd0841907f133b4cba67a35f_cryptolocker

  • Size

    76KB

  • MD5

    9a5153a5dd0841907f133b4cba67a35f

  • SHA1

    5a62e63e7078465548dcb258a64ac11da3d56b8b

  • SHA256

    3992fdd28f264c7c7743d7cf98bdc40b45879940dbaee4a32faa33debc1464b1

  • SHA512

    56e1faae5064bebeff856e78647b9b5a6c9582a5d1840b60abe0c31522550cb8b3f28aea96e21b58ab28353acaf4fb7ac61ed35478eb7726b0e8d85a876736a7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTzce:T6a+rdOOtEvwDpjNwe

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-08_9a5153a5dd0841907f133b4cba67a35f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections