General

  • Target

    2024-10-12_a0a0b941a45ffa57cc990b6db49621e3_cryptolocker

  • Size

    55KB

  • MD5

    a0a0b941a45ffa57cc990b6db49621e3

  • SHA1

    c14c52a299edbfa5a728a723ab4f6da924b41cfd

  • SHA256

    6faef10ee46b82c2b48add8311e3cf8e93521ff175cd53f2023914171d4f8f4f

  • SHA512

    c3bbb5ccd0a6847b394f24a996728dd7ad193d4747630cba9c7705b1eb09f1ec47bbb672135faeadafaa6e2e060fddda5c1c5430c2b27dd3105c46aeb1646471

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPY:b7/y28wZEjbnouy8G76iH/NLpe

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-12_a0a0b941a45ffa57cc990b6db49621e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections