General

  • Target

    2024-01-11_f7477a764567593c8e8d0dbbcd1ac039_cryptolocker

  • Size

    77KB

  • MD5

    f7477a764567593c8e8d0dbbcd1ac039

  • SHA1

    46f4d7abc6741dc9d53b48ec164f4d3e4f5541ac

  • SHA256

    0d94136e230ae74b99e8ded4e4a3932f75ec72a4cd698ff506d26534ab95dc13

  • SHA512

    44b5c836833726fb0084c6fe621242670fe3e733dfb913f4f165d30c5b5b903f2b208250e1cbebf64c0a175fb3d9bb527adf87b5f4e3fd2e9df054782f1f8261

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdK:T6a+rdOOtEvwDpjNtI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_f7477a764567593c8e8d0dbbcd1ac039_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections