General

  • Target

    2024-01-08_350dee1d046810ce106a7e05354b0e81_cryptolocker

  • Size

    148KB

  • MD5

    350dee1d046810ce106a7e05354b0e81

  • SHA1

    f1f1d4d48b82950f6858ecb60a24c150e7cec5c9

  • SHA256

    17bf926834eb726f0ed335b314b9e71bdc614735f62b89f88b1b1af87d062dee

  • SHA512

    31fe78e7355e96005e81aac5e94079e56212a37b2fe0502544cd42b543b1d9ba1116cfae0397c105ea351b8c834082bb5c8411471bd13dfcf319adc59f65eca5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpt:T6a+rdOOtEvwDpjLzi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-08_350dee1d046810ce106a7e05354b0e81_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections