General

  • Target

    2024-07-05_8b5cdd51f90c5b054f724250f7a90900_cryptolocker

  • Size

    59KB

  • MD5

    8b5cdd51f90c5b054f724250f7a90900

  • SHA1

    62c298179e24d5ce1cc8de45597d00ddcf45539e

  • SHA256

    72f54fc40bd8a773b085100c767094e6ae7831771a49e9d2443a97fc79cdc563

  • SHA512

    40c574b2f173724a0037056dbf6a742f44775fc767b87619d31a8bb1dee10048c7d5774f9bd7a6a8f5c4e6a676ac2e2eae1759bf7c9a3cd6dd7d587a2fdf3572

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5ax+Nx:z6QFElP6n+gKmddpMOtEvwDpj9aYaK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-07-05_8b5cdd51f90c5b054f724250f7a90900_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections