General

  • Target

    2024-01-08_6a4cfd5c4588323db3b8a37efe47ec13_cryptolocker

  • Size

    148KB

  • MD5

    6a4cfd5c4588323db3b8a37efe47ec13

  • SHA1

    7348ed4e3133bfb4c133d687e19576b66f04bae6

  • SHA256

    23529a3b119c5ef129ecbe6bd0709ef52709c9cae1bb5f5aedf9f113ed10c0f8

  • SHA512

    81f25450608e6dad6dba8f2982421b9766a69f9dd6a7e3a8e68d8a5e70a1bc62db6c23a6f47cec2dfc4c797bbfc5a29ef817bd7334b3a2e37f742353a7d2da3f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egJ:T6a+rdOOtEvwDpjLzM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-08_6a4cfd5c4588323db3b8a37efe47ec13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections