General

  • Target

    2024-01-11_b3c1141a220433da3f51a80a4a6f229a_cryptolocker

  • Size

    77KB

  • MD5

    b3c1141a220433da3f51a80a4a6f229a

  • SHA1

    880e89cb1a27763efd52d5d46b08b1b42b69b1fe

  • SHA256

    92144e5f507be61a170aa811e50904e8559caff20dc10640506980cb61994505

  • SHA512

    3d564e683e76c5f8a60ba9d80c9cd262da6dc2d757d0c4671efe49a7319d6853ee01d6a07ef30fa9ab0aa605d8b21b314feaf2e978db729cfbfdb031207fdc47

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBs:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kym

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_b3c1141a220433da3f51a80a4a6f229a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections