General

  • Target

    2024-01-10_3a4401fee50523d4696a6da20dc2ca7c_cryptolocker

  • Size

    149KB

  • MD5

    3a4401fee50523d4696a6da20dc2ca7c

  • SHA1

    89f872bc2f78d2144289fad6eae7047b96f35f96

  • SHA256

    71c2c5cea4d865d0736e8c3648bd739b310761a52f77283bdda17017ebb95be1

  • SHA512

    ee42b21ea5ec155cc485496dc824b8f58ed90d1d23e297cdbc0cc212216aff7d4eddefee657be729b1c8cee5e2275e8607ba77f449cf0795d4a38afb0bcc8557

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpm/:T6a+rdOOtEvwDpjLz/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_3a4401fee50523d4696a6da20dc2ca7c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections