General

  • Target

    2024-06-19_55b4a8b886f8a338238d05835d7fc0cf_cryptolocker

  • Size

    87KB

  • MD5

    55b4a8b886f8a338238d05835d7fc0cf

  • SHA1

    eeb23b09f9ecc159c4ef04d5e920c5ba4b3dc717

  • SHA256

    79235196959d2375c15a7d16edd9cda9f39df764292c865d7cb35a328e3d812f

  • SHA512

    38fa91b5f13d653067a17135a5ae5a882eccfde3f14c1f9cc0765f240454f5adc14a0af79e39f607ad61962a339c1d2a952f0f3d47ca8fec6f65d08b52aa4b40

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5RF:T6a+rdOOtEvwDpjNY

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-19_55b4a8b886f8a338238d05835d7fc0cf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections