General

  • Target

    2024-01-01_fb343c4214d82e1346afdef0c8100167_cryptolocker

  • Size

    56KB

  • MD5

    fb343c4214d82e1346afdef0c8100167

  • SHA1

    a2e5de7ca87f0e82b6f5f65a38e5abd4d8758dfe

  • SHA256

    941fa0657b8c265929de827d511a9c21215bf2e3faf526ca313930a009e929e3

  • SHA512

    0d2061667f587cad94bd5effbf4817994c17080f0673992d542767c597bd604e4c6834bcd599eb7fab55aadbe2565fb818a1085f08b8c6aa59d90512e16d2c7f

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax8gZpVNu:z6QFElP6n+gKmddpMOtEvwDpj9aYaxLQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-01_fb343c4214d82e1346afdef0c8100167_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections