General

  • Target

    2024-08-20_5dfebd8050f479bb89d11cd2a9358f3c_cryptolocker

  • Size

    40KB

  • MD5

    5dfebd8050f479bb89d11cd2a9358f3c

  • SHA1

    704b3716bc2205daf73eea73d75ad3da09ffe0b1

  • SHA256

    bd674883ba28d7270609dd5dc5cc075311d2afb2425c32b0806f6d84af82be4f

  • SHA512

    a985bc86155e47abcd282a3a3441a22c06aecd79c1de36a259306e92602f37578d5887b447c28f4f394ead8133e980e377b1ad99281426dd8c56d43a8389a5a6

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiXu:qTJu9cvMOtEvwDpjppVXzRD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-20_5dfebd8050f479bb89d11cd2a9358f3c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections