General

  • Target

    2024-01-09_6534e085e0f7b313b301b909d9a0d19f_cryptolocker

  • Size

    75KB

  • MD5

    6534e085e0f7b313b301b909d9a0d19f

  • SHA1

    fe510f01b794a058f7ea020f47c21330e76dd419

  • SHA256

    54c886f3a8aa541254d3ac2045d5bf122b0d162ed3713b8671506de36bf6da44

  • SHA512

    9fb77a21b1396f80c427cffe070a44ee63d2ffcf58c9dfa9d22660c11b110b468ee0f60c9039f55882dcbf2b3b0ebf603c327cf8941cfddac95974a064392c35

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdtr:T6a+rdOOtEvwDpjNt3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-09_6534e085e0f7b313b301b909d9a0d19f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections