General

  • Target

    2024-07-04_84b2e7bbf7ec0fc7a38491942d2c363f_cryptolocker

  • Size

    53KB

  • MD5

    84b2e7bbf7ec0fc7a38491942d2c363f

  • SHA1

    66d7a293117d817e8364845ffdead8a93d19cb99

  • SHA256

    409f8d35c4cd963cfa7206385b717ecee5addfc78384774ae894bb0b103077a1

  • SHA512

    23d507ab53a4c45cf4940cb764a557b0b45f7a39ec6f25e15cc56ae171ea7692f18d28349d08227a26377718246fa8e1fccafaa313b625593ea5fac4e305afaf

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOk/4:z6QFElP6n+gKmddpMOtEvwDpj31ik/4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-07-04_84b2e7bbf7ec0fc7a38491942d2c363f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections