General

  • Target

    2024-01-11_8e1b963caeeb9d101f050fed28f6d37a_cryptolocker

  • Size

    60KB

  • MD5

    8e1b963caeeb9d101f050fed28f6d37a

  • SHA1

    e08543a09c6479810f72e603b8297dfeef9f9ff1

  • SHA256

    2d523335f7bf9e8e9a552b2f15edf8df346328eac7d31177cfe831e30721aa7d

  • SHA512

    67e9708e6a05bad208050a47e3d1176bed8099e662807ddfdefd83046073efbf6cf3d107560f2ee294f538c06f23b0022590613dc34258f96eb5ea31a2666886

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5hq:T6QFElP6n+gxmddpMOtEvwDpjwa3o

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_8e1b963caeeb9d101f050fed28f6d37a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections