General

  • Target

    2024-01-01_346029872c00b101921c38b2db4786f5_cryptolocker

  • Size

    73KB

  • MD5

    346029872c00b101921c38b2db4786f5

  • SHA1

    369a6b0bcf150f6ebe080e9ee66e01a4178b77ba

  • SHA256

    c06a5990a069fd508a0586a63235068bac3536fced255dba6a14b28b941468f7

  • SHA512

    d021c08802b47353a73f7b98f1e4c381437a49f0a12c170523b1277debd13065a4c4525cf27dccbca79d44b0a1859c352547484402abf9a841a26521062dbade

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdC:T6a+rdOOtEvwDpjNtg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_346029872c00b101921c38b2db4786f5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections