General

  • Target

    2024-10-15_b0e0b6d5f348407dd7f19e1416fa8428_cryptolocker

  • Size

    74KB

  • MD5

    b0e0b6d5f348407dd7f19e1416fa8428

  • SHA1

    057a626463788dbb96589bae20f317f50a0c50f7

  • SHA256

    6f3c036e100e003eacb18aff03075751aa76cdcdd03b9caa8a47d276f0b6f1e0

  • SHA512

    61a73d14cf8e27d06081904fca5f2f9fbde8a467cf54776bf4a38fc786cd09a5cd883de530bac88c59e133a4f17ccac737691528a3017ee788eab543062485c2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd1:T6a+rdOOtEvwDpjNtT

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_b0e0b6d5f348407dd7f19e1416fa8428_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections