General

  • Target

    2024-01-01_c4f20e5481942f09c6e657f384be8551_cryptolocker

  • Size

    69KB

  • MD5

    c4f20e5481942f09c6e657f384be8551

  • SHA1

    e4051a882ebd3837a9ddd53666d05a3013fcce3c

  • SHA256

    fc00679108750688b6b58b3de7779fc9ef248e15ec24566559209a0ce7245403

  • SHA512

    03031346c29de2024fceaef5c3fe6660ddb65714819f5151ec2bbf21c6f74d081941fa0629a2db45c7773f3d7da51ea7a15e832ffd3ed4a6668468c47f28bc8b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB+8x7Z:z6a+CdOOtEvwDpjQH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_c4f20e5481942f09c6e657f384be8551_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections