General

  • Target

    2024-01-10_efc616fd05652fb790c6a4e32bd84832_cryptolocker

  • Size

    149KB

  • MD5

    efc616fd05652fb790c6a4e32bd84832

  • SHA1

    f0f7615288490d602bbb12efd2ee252963f68373

  • SHA256

    12439ed9176e6c3a62cb06b47a0a81d46a0a8f485712769b6ce0921cd98f238f

  • SHA512

    3a05d0df6ed52d050eacf008f9809f1ecaeab8ecd35c6c83a58d85dcf4bbdeeb7f954ba06849b5a83b134515aa4784a0f8db865b0ca71a179a2bac83b5b0af44

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1egpm6:T6a+rdOOtEvwDpjLz6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-10_efc616fd05652fb790c6a4e32bd84832_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections