General

  • Target

    2024-01-10_3236b3c28e8a23d53e448d132a63f113_cryptolocker

  • Size

    61KB

  • MD5

    3236b3c28e8a23d53e448d132a63f113

  • SHA1

    a584faf16b8ceae3f70d0fb5972127172682f8eb

  • SHA256

    9f779c018d0d3b9abbed033925430c2d8e7c2afb0c480d890e362535d19f524b

  • SHA512

    d3b38f22166bc835b38d67fb8f6dade1435778c822929ace03249defe237ad0a6efe06c52efd2541fb1450920c3366f5fbcccf6c7fb8b8f0dafd739b39adc877

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5f:zj+soPSMOtEvwDpj4kpmeLmb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_3236b3c28e8a23d53e448d132a63f113_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections