General

  • Target

    2024-01-11_1172bdf34a805dbcf3d6931605024b5d_cryptolocker

  • Size

    60KB

  • MD5

    1172bdf34a805dbcf3d6931605024b5d

  • SHA1

    c6bbbb392c887dfe1997398e4c6de57bd1c3ee94

  • SHA256

    bc2e76c71501637dd28ea78cedc7eb29c833a96c29a79828139ce3617f33ae97

  • SHA512

    145716ada39849293ab634189d0b64b93af34b1fb2b9384ece36238e453b74ad9e0cfc3d0939c70544aa4c3bb394c292173955c796a8c4daaeaeee764702683a

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5hl:T6QFElP6n+gxmddpMOtEvwDpjwa3T

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_1172bdf34a805dbcf3d6931605024b5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections