General

  • Target

    2024-01-11_ded4d25f68edb3645f307f14fa68024c_cryptolocker

  • Size

    61KB

  • MD5

    ded4d25f68edb3645f307f14fa68024c

  • SHA1

    abdee41d4d848b94b16d87782dfd299f5af84b49

  • SHA256

    76a9a57195dbf5d1ec24e32451ab3fc8896dfd7d0fe37a9d28b70ee424f7c2c9

  • SHA512

    bde6501c736e3be2c6fd128e9741c310cdf89ce33934a1d729df45745159ab6c0232e4d7a14f1e4f679289ddbafbf9a3429bf2dae8f8144f1991c5bf13ed3bd1

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5+SqA:T6QFElP6n+gxmddpMOtEvwDpjwa3bqA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-11_ded4d25f68edb3645f307f14fa68024c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections