General

  • Target

    2024-10-14_6a0e04c07c5ef231749c8b5a410e0d40_cryptolocker

  • Size

    43KB

  • MD5

    6a0e04c07c5ef231749c8b5a410e0d40

  • SHA1

    3cce393b322fae7b448c241665e14b943813bd40

  • SHA256

    cdfa6090eafceb7463b6e0aca725138e56140d10a60c8ec8378347a5ad8994ef

  • SHA512

    5d3e7de558e8ec90d75fde1aa04684f0291936a0f5c3dbdc2c6ba021a89368fed167ca64e57a52ea32e3bcc1326a2f95904a3ddd470153fadcbb6961e05b1196

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsmHBdm:bO6YcA/Xk3wXFXSqAJI

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_6a0e04c07c5ef231749c8b5a410e0d40_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections