General

  • Target

    2024-07-23_bb0d2d49de67718f3ac5c4a6b91f74ae_cryptolocker

  • Size

    60KB

  • MD5

    bb0d2d49de67718f3ac5c4a6b91f74ae

  • SHA1

    cbdb5a620c0b128d78452c84cad664386c46c573

  • SHA256

    143f383cc716b4d5492ceb294e9bb6abd4a376ac38366cd2862731b9a3dd9d5a

  • SHA512

    6e6b94e30ce5daa68f9994469a70709f2fe0cd631e5d280a1dc4b0c6b24f00914b3431f13eed7061298e919b4be570ee1dc94a8b3316ad7a4c2a8f0457599bf9

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUFHa:T6a+rdOOtEvwDpjN+6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-07-23_bb0d2d49de67718f3ac5c4a6b91f74ae_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections