General

  • Target

    2024-01-06_d685fb39d70484bd5bf8684b520eb11b_cryptolocker

  • Size

    148KB

  • MD5

    d685fb39d70484bd5bf8684b520eb11b

  • SHA1

    e5c3a84ff8d83fe3fa0c5407419991701e5e88f9

  • SHA256

    d1a8e6baadc6005b715045c1318af8e103db3848b980e8834fa0d7279118f133

  • SHA512

    e6b8017b677d3ca01016955c64a0f3d32948bd5a61df6c56e9372e8351b78371c068978197c26c3f3c10c6d36d306ab6064d47f4cdf266a0307402649dc76cdd

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egY:T6a+rdOOtEvwDpjLz9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-06_d685fb39d70484bd5bf8684b520eb11b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections