General

  • Target

    2024-01-09_1bf34cef8ce12a3edf5ab419c4b36563_cryptolocker

  • Size

    148KB

  • MD5

    1bf34cef8ce12a3edf5ab419c4b36563

  • SHA1

    25551ee76b9b4e957c4cbe66870f40bdd3a816c0

  • SHA256

    2940fa15ecb130cc1fb56e7e304a3e9cbe585bae3186b33fb8eef3624e774751

  • SHA512

    c1ecff1569a0e62ccf571a0018a9708fb9f9bdda94cae32b4769f79b51faed0bee1dd0ed263b99cccf57341650de4cc25b9158537ba5edc975c4d5a3dc5c6ab9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpm1:T6a+rdOOtEvwDpjLz1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-09_1bf34cef8ce12a3edf5ab419c4b36563_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections