General

  • Target

    2024-08-26_c4a66594bd4a2d5d005b034e4752af2c_cryptolocker

  • Size

    62KB

  • MD5

    c4a66594bd4a2d5d005b034e4752af2c

  • SHA1

    bce089f573a85d67b96c688a53ef1d1cd8d53bbf

  • SHA256

    bd174e1ea7befd4e3da55cf90eaa2c26fde85143f5c7292654418dc6a9e1b1df

  • SHA512

    e34cfb047f05f3b4e50d57c6d7dbe3f3c038f77e0eefcccca925d2bb3698b5758dc00b7bc6c7a9e0d0b9adc60d4068816bcb551a92f449898c98bc0642f17093

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhz:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-26_c4a66594bd4a2d5d005b034e4752af2c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections