General

  • Target

    2024-10-15_4a6a662dc4f3af273d3c184f4d4e36aa_cryptolocker

  • Size

    46KB

  • MD5

    4a6a662dc4f3af273d3c184f4d4e36aa

  • SHA1

    56009e268ec022e674bffed86b2b2ba709472133

  • SHA256

    2ed88bf0601b0f39b33619f66aebff2811e53d4c3097cc803e9c2deabe2c9e07

  • SHA512

    f4a5dce3f0895b6ce8fcbff2e5c493e3f03488d8eb6363a55195ef25747de3b0c3e9bcfe0eb44354ff4d8f0950805967d1e2697466242ce2c08372485c18ad17

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqO8:bODOw9acifH+YH

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_4a6a662dc4f3af273d3c184f4d4e36aa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections