General

  • Target

    2024-01-03_16bcaedd39a4ce1b974b584eca48ae23_cryptolocker

  • Size

    60KB

  • MD5

    16bcaedd39a4ce1b974b584eca48ae23

  • SHA1

    6d940eed99d28d093f486819da9259c12b449083

  • SHA256

    52ac9207eeee3cbad7f7a859656597a35ee6900ca03ddeeab5de9aee9b17a6b5

  • SHA512

    0606214fe319d9c143b89edda6bc8fc14126f17116f4c300a66c35e7352ab432d81cce24e9ff914369495114229d34613b1affd655b9654f0018e66638ff1144

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLHx:zj+soPSMOtEvwDpj4kpmeLmjx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-03_16bcaedd39a4ce1b974b584eca48ae23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections