General

  • Target

    2024-06-20_6b8b2af7d3446c27408e30b9b9d9bc38_cryptolocker

  • Size

    63KB

  • MD5

    6b8b2af7d3446c27408e30b9b9d9bc38

  • SHA1

    92775bbe3894dceedea88ce2c2d7ce2fca579e23

  • SHA256

    868a9ef184cd8e69cbf95fcf1b2b02aa978f4dafd26a77aa1e488c5c4c32fcd3

  • SHA512

    3b357638335e5c2584659ea662d19658e418809b4575cdfc25da7790f850de8bc91daf8c56bde895c8721096cc9686668c258c571d6611a320280e2685728ab1

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zX:0j+soPSMOtEvwDpjwizbR9XwzX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-06-20_6b8b2af7d3446c27408e30b9b9d9bc38_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections