General

  • Target

    2024-01-09_44e0eefdb5f0c63f4b687d4992a0bb33_cryptolocker

  • Size

    148KB

  • MD5

    44e0eefdb5f0c63f4b687d4992a0bb33

  • SHA1

    391e64573fd53847a2fd8a40c9a4954b101d50f3

  • SHA256

    8c34be13e59afc3c52dc3be4177c9cae68ff4ad1a6336dcbf3534b6ba58e9641

  • SHA512

    40e602fe44752326c7183a7a64cf3cbf8ebe331f73c3e6d745e4cac0e14db2e67caf735247dfc805a2d9bc24ec99174531802bf353a8055f2965c4ec90066cc0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpm2:T6a+rdOOtEvwDpjLz2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-09_44e0eefdb5f0c63f4b687d4992a0bb33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections