General

  • Target

    2024-01-09_22977f5d94563df9238022bb5226c176_cryptolocker

  • Size

    75KB

  • MD5

    22977f5d94563df9238022bb5226c176

  • SHA1

    442e8428b0a63bf45c0b694f3c033cd06f87da00

  • SHA256

    316d73bc4b39ca1d05298b6be39d3b821d755792f28b9d8420b83f441489f211

  • SHA512

    aea7f7091470f3a7dc7207522a87a2d6e9f316f36845160c3e8c6262585334102a8bfa9b6dc399fdcadd6dc75a9048934b8284adc6565ec2c28315e12e2e3b32

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdg:T6a+rdOOtEvwDpjNty

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-09_22977f5d94563df9238022bb5226c176_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections