General

  • Target

    2024-06-20_8f0b077fc43d47109eeef3834cac5de9_cryptolocker

  • Size

    81KB

  • MD5

    8f0b077fc43d47109eeef3834cac5de9

  • SHA1

    f927cc4f9676020df7df3f65d380e57fb89e004e

  • SHA256

    8d1e12e85709a74edd8b1cade3ac6d35cf267bd2a7320337970e50ab33b1c386

  • SHA512

    ad4ca6b6d4f0d3114a1867a899b5c525ea041746dd53a4d796f0823021457b8f5775cdd019fdb038b588c8eb5dac5d3660705639e644268f14ec091395f32160

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqdH:T6a+rdOOtEvwDpjNcS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-20_8f0b077fc43d47109eeef3834cac5de9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections