General

  • Target

    202404147f57b1c9499022d6668ee5fc3e43903fcryptolocker.exe

  • Size

    65KB

  • MD5

    7f57b1c9499022d6668ee5fc3e43903f

  • SHA1

    a830e87ee06c63b3c9f8bc8126b2f4a9addcf875

  • SHA256

    3fd79150779f90a7892daf6406aa698ec1c89b61a4c28809392d349d3702bc00

  • SHA512

    5dd577684ac3cc505045a41c3339a4d51f7adb28104938deba6a1a93a32af92ee78e9ae526ccefb0c71f492182fb8b3c1d49f3090776c3e0d3f038ac33f32ae1

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5BB:zj+soPSMOtEvwDpj4kpmeLmQ/B

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 202404147f57b1c9499022d6668ee5fc3e43903fcryptolocker.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections