General

  • Target

    2024-01-03_4d7db7e50ed30f7f68372cee503ed91f_cryptolocker

  • Size

    107KB

  • MD5

    4d7db7e50ed30f7f68372cee503ed91f

  • SHA1

    4e7c0598ca0f0594fa4a8bbb6186706105c9101f

  • SHA256

    c7303af4a6c7470adf994cb596fef18f843eab4820355f427c1a8b2ca7e00012

  • SHA512

    363a94d5280b86287f6e36c285103c2053df2b9d7f6aaf139aae83f9a7c75313cc9f531bd9b795c208c1b8a00472551b0f193adeb660677c443e8eed4b126a14

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeIK:T6a+rdOOtEvwDpjLzg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-03_4d7db7e50ed30f7f68372cee503ed91f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections