General

  • Target

    2024-01-08_662dccc65819f8a54406f45542579395_cryptolocker

  • Size

    148KB

  • MD5

    662dccc65819f8a54406f45542579395

  • SHA1

    3d285e681328a946c99d36947fd0d47e5e8e3a57

  • SHA256

    c6c5f82b2b3aa50742c7fe762ef4ee1c091465b66c880d17d75e15f4e361bf95

  • SHA512

    65d99eb682332d4e95c35ff8341dc1a3fc912989d3987ef5f0706c98237b2a977de0c2a4840a91865dfdd5c3dcaed68dc8add2657e5157a03fcc60f228409f5b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpr:T6a+rdOOtEvwDpjLzo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-08_662dccc65819f8a54406f45542579395_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections