General

  • Target

    2024-10-15_f5878e4fb17f6e72f85537a1ee0bae10_cryptolocker

  • Size

    40KB

  • MD5

    f5878e4fb17f6e72f85537a1ee0bae10

  • SHA1

    0f5b1bae032d7313267d3e403b089889cbab3c93

  • SHA256

    c067c7d86e6c618295fe2c7212ffd7480ef0d10e587f7110e4b044d6e12c6d96

  • SHA512

    61748c57e8d562c9096d6a36c448f7a114723fdbc60d6b0418331c15161e0e023d36b1a4d69181ba3e9a236de5e588c68f04b2581044b21bc9e03fbf9f8c28b8

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiK:qTJu9cvMOtEvwDpjppVXzR3

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-15_f5878e4fb17f6e72f85537a1ee0bae10_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections