General

  • Target

    2024-07-05_40ef6c83eccb460b89f57b837b4afcbd_cryptolocker

  • Size

    53KB

  • MD5

    40ef6c83eccb460b89f57b837b4afcbd

  • SHA1

    cbfc7ed14c7aabb6b46b054d957282b7dd243869

  • SHA256

    b44ebe2e39ab6b6d31f52313e267705dc0206a4e2f959f6464103fcf3f70727b

  • SHA512

    20e4ce27370ce0b9be6f184558cd25ba619f86f2b1bffed47c03c662987bb88222d0248729d7dcb83ffc80c8af598b247cab9216a59b619b2011d9069a402db5

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtO6:bODOw9acifAoc+v9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-07-05_40ef6c83eccb460b89f57b837b4afcbd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections