General

  • Target

    2024-01-11_b6c403a372db1c83d0c4b7d7419389a2_cryptolocker

  • Size

    60KB

  • MD5

    b6c403a372db1c83d0c4b7d7419389a2

  • SHA1

    d3bce499e2943762644548ec529df0ff4706109f

  • SHA256

    745349913347c74dbc5dc3c03c28a197578394fd842b4d0421ccf25e4ee823be

  • SHA512

    74652ba4b697b6d7c07f0bdef4b1ce623cf5969acf99b65d9921bbd5a34cc9f94d25dfe8303df8b3e7e06476ccaa72063448f5ceb7f2022f1dba38a4332a7a22

  • SSDEEP

    768:qgmnjO6LsoEEeegiZPvEhHSG+g1Ium/kLyMro2GtOOtEvwDpj:qgmnK6QFElP6n+g1lmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_b6c403a372db1c83d0c4b7d7419389a2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections