General

  • Target

    2024-01-01_4f6784257c4cfa39eeedc6121e507665_cryptolocker

  • Size

    56KB

  • MD5

    4f6784257c4cfa39eeedc6121e507665

  • SHA1

    eccbb2ef36268ca847cf71c165919991ebe04ea5

  • SHA256

    a67ad3fd4c4a01a5ffa301ceee2dabf52ac949300d43f042e937d9721b46fe02

  • SHA512

    1cf1a9db3b1de3dff15548262f153249cb6cb66ad9ce6e8298f78696394e107be2e5182ff3b3ed67b4d31f38423a56353632a6180d1030783e61b0f695a39588

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax848+hW:z6QFElP6n+gKmddpMOtEvwDpj9aYaU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_4f6784257c4cfa39eeedc6121e507665_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections