General

  • Target

    2024-01-10_929d2c5473cb22f9e43627318f43f716_cryptolocker

  • Size

    62KB

  • MD5

    929d2c5473cb22f9e43627318f43f716

  • SHA1

    3dd934ee06e214515a59134d624a282496ff3811

  • SHA256

    8eae59d5ec1c80519a358e99a14934bc1cfd89f97b8ff97c794edbf7c8ff520d

  • SHA512

    4fb6ec5e1904ae63ec3fd44c9508ed33c5d54a3d95d3f8ccd6afefb5c395447ed17ea3743da32551c97096ab0772c44be9c992bd79dbfc5479103954992c3741

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ54:zj+soPSMOtEvwDpj4kpmeLm8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_929d2c5473cb22f9e43627318f43f716_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections