General

  • Target

    2024-08-24_ba4ffa2cb8c60111f5ff933ea5a7d22c_cryptolocker

  • Size

    92KB

  • MD5

    ba4ffa2cb8c60111f5ff933ea5a7d22c

  • SHA1

    4da3121f525f8d3bfc3874b2466c6c1a5eb882ba

  • SHA256

    27793aa8981e40eef2e45cd45ce935d047be0ed6862978d270c66802406dedab

  • SHA512

    a316b4a01828234eb5608ef1b34f7e8f53bc417e8afb3b5ff6ed96941976dde6bcfb29d208f493c14fbd65395bc721f84e0f35e0368e3189a835b13390f31df5

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAeh:n6a+1SEOtEvwDpjYYvQd2Pc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-24_ba4ffa2cb8c60111f5ff933ea5a7d22c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections