General

  • Target

    2024-08-22_a55f907bcc4eab819c0a3d5f771f8e13_cryptolocker

  • Size

    39KB

  • MD5

    a55f907bcc4eab819c0a3d5f771f8e13

  • SHA1

    2f2eebe396cc9242bbaa191e5503b7b8bfababa2

  • SHA256

    157fea5d7a31db34bfeb5ec5ac536f9900f36a34cd6d6991a42303dae026e924

  • SHA512

    4750c86d5cee60228145e7b868a3524a1fe833aa901b2e309903fe9539ba70d8dcad0ef14bf81802278f142c787c71217992ed522421cd7f95918c3246758321

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT+Sg:qDdFJy3QMOtEvwDpjjWMl7T+n

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-22_a55f907bcc4eab819c0a3d5f771f8e13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections