General

  • Target

    2024-06-20_91549487bca2fc8c41b1d7f7c3fe4272_cryptolocker

  • Size

    63KB

  • MD5

    91549487bca2fc8c41b1d7f7c3fe4272

  • SHA1

    cc460bfcf983b6218669fce84808f45eb6a9e078

  • SHA256

    f772d32a7fb6beeb9c398c168e106f163352ab207bb1682644419a6bfb447be9

  • SHA512

    fa4d6397d6356b07135eb83d5977e4101fc7624486b812448bd1c03b7acc0c88b9e91de11196fbf23b25dcc013fdcacd6903891aa1d9fc56c8ade6846d62811e

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zd:0j+soPSMOtEvwDpjwizbR9Xwzd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-06-20_91549487bca2fc8c41b1d7f7c3fe4272_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections