General

  • Target

    2024-01-01_c4a04ed9d980d8743995e90e32a2ff2d_cryptolocker

  • Size

    70KB

  • MD5

    c4a04ed9d980d8743995e90e32a2ff2d

  • SHA1

    d106efecfd4854b88c23dcaa5a6b0bfdf1578a49

  • SHA256

    303815bc480ad15a34b0ca0c07fcbb0c78a58f80b0f05cd56bcfa317119409ff

  • SHA512

    1bc9e3f656a0c09915095d2005df95461c1615df4c3ba945ce4b8dacbc7239b5f9782e3a710ce033e53b2895ec6f7a664fb5ffb34951c52cce40327b2eb0e459

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+8x7K:z6a+CdOOtEvwDpjQQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_c4a04ed9d980d8743995e90e32a2ff2d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections