General

  • Target

    2024-06-28_4304f539bdb7d209cab13482dc5e3447_cryptolocker

  • Size

    36KB

  • MD5

    4304f539bdb7d209cab13482dc5e3447

  • SHA1

    abad915365d2831acf34f712041709091219813c

  • SHA256

    0780596a2cba88193ab3a28cb038f5d510223661a35f392937940277ccd3f64a

  • SHA512

    47bef35a94bbdc35aaa33e69f9de39bc9fd5f8ae213d1630c528dc649945aba828becd4e416ca9937cb73afed512cba3a8a51ee3b9b326aed8f3d63ee63d6e9f

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT4:qDdFJy3QMOtEvwDpjjWMl7T4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-28_4304f539bdb7d209cab13482dc5e3447_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections