General

  • Target

    2024-11-20_fa10106133d53bd2e43f0afc44ecd329_cryptolocker

  • Size

    72KB

  • MD5

    fa10106133d53bd2e43f0afc44ecd329

  • SHA1

    122c6d5dcf2913ce264c9f70fce8f41455d0d90e

  • SHA256

    a34a7a47071c6148f4b4c86696df05760ca10f7c6423798d4d60c69a7c578e49

  • SHA512

    1586e485fe6369acf02e3c6cc7f66f01f386777b29fefecaed4d4d0178c53989c79ab6ad20895a61ae50d8d86f067d986eda89f42b8f1791390c9e811f152084

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9N:C4Q2c94OtEvwDpj4H8z8

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-11-20_fa10106133d53bd2e43f0afc44ecd329_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections