General

  • Target

    2024-01-11_c33f1ef0cbbf68ac062704ef445d1074_cryptolocker

  • Size

    116KB

  • MD5

    c33f1ef0cbbf68ac062704ef445d1074

  • SHA1

    7fa8e9f7c158843dfda3607a26e88e8765c98c0e

  • SHA256

    fa5cec7cb5c5db56cf3be01287829347391f29340ab916203b2990a79766bd6a

  • SHA512

    b4fda25f944bf721f80cdefc938327edff7eb7de9f682fcec64e665fab412dbe12a2b6ed5d6aafad7decd10ea65a4bb2c59b6c4f372f836657d83293e3405378

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/Xd:T6a+rdOOtEvwDpjLzM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_c33f1ef0cbbf68ac062704ef445d1074_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections