General

  • Target

    2024-08-26_040cae3ab45df33e60d2a65b35395040_cryptolocker

  • Size

    63KB

  • MD5

    040cae3ab45df33e60d2a65b35395040

  • SHA1

    d945e74d66e7a8b2de30049c2250b4120e292358

  • SHA256

    3ae2bc84a176446343bf7c32fed9af37fd07f247ee7236a45f45ea7774d3c16b

  • SHA512

    5b96a9dea4b8e8b041532b5f616161c991b03af8dcba33223839e6639c77135d5c1ac5220067d19d7884b2aece7e3ccb2e76caa818f9d91b59799ea1b112241c

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhbl:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-26_040cae3ab45df33e60d2a65b35395040_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections