General

  • Target

    2024-01-10_22017c02c21973adcc18f94951ec317d_cryptolocker

  • Size

    54KB

  • MD5

    22017c02c21973adcc18f94951ec317d

  • SHA1

    f49b8bdd3d08397207f618c6b317c1042b2601ab

  • SHA256

    642cff2a777dd03ac73619f39aa47b33196a50745ca98e9800f45fc276d3c2ec

  • SHA512

    87880ad2fa3befd6ffa6fb8dba84a4f0a85014e9dc60e0012f5a56d6ceaed90141121660140b7d3064fe47568701ee16d4b093fed181cf396e9b376b4987e729

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpj50:zj+soPSMOtEvwDpj4yh0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_22017c02c21973adcc18f94951ec317d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections