General

  • Target

    2024-10-10_56a4eccf00e0190b5ae14351a8740b32_cryptolocker

  • Size

    60KB

  • MD5

    56a4eccf00e0190b5ae14351a8740b32

  • SHA1

    e91ba364d3ed958c8ae1d2802ca7cf9db2baa0ce

  • SHA256

    e8963650138a7352c4a4a6dc30541cbbdedfc120af80fba212318e00e15b1efb

  • SHA512

    603a3cd88b94fd293e468140d46ed3f4a3e6e9e1a600eeddce6e6718c6e1545b29af8950a55da7220c837fdb4aae949ddca563a48747050ae1a0238c4fc32ac4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwa3TtRPLw+:T6a+rdOOtEvwDpjNDH

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-10_56a4eccf00e0190b5ae14351a8740b32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections