General

  • Target

    2024-08-24_4f905233137bf4616ea9b2769ef8bd92_cryptolocker

  • Size

    38KB

  • MD5

    4f905233137bf4616ea9b2769ef8bd92

  • SHA1

    bbfb062886e1f5a6c9dff7a030c67034c1bd8903

  • SHA256

    ba997f148800067fb46ad8865e9ad50e5a5d09126c5d4a4f4d6e9a6e26ad9334

  • SHA512

    bbdf50ba38d861d30da1a9f6ab001fa05fccbbfe68caed054a6a63fa8ebb484c74b20f172aff331ad70c7d790417f8d9fa01167a11da6aafadc6e136e9316920

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITc:qDdFJy3QMOtEvwDpjjWMl7Tc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-24_4f905233137bf4616ea9b2769ef8bd92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections