General

  • Target

    2024-08-29_93814fa87f2e6bf51b1781b8b51bf19f_cryptolocker

  • Size

    40KB

  • MD5

    93814fa87f2e6bf51b1781b8b51bf19f

  • SHA1

    91fce356f9672594b11a766f9c7d59adb6ca4288

  • SHA256

    ae1ceb6a4a2f4b6b6fd5494e880fa9afe864032e8ffed140e321ed82cd228570

  • SHA512

    1d74f34f776960cc9817d4738b1b43767ceb41fd79f096cec3df568a73586656b7580d78bbcdb80c86205d5bd884bcfa34a731f110d9659ae9a24df91a8a9511

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiX:qTJu9cvMOtEvwDpjppVXzRC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-29_93814fa87f2e6bf51b1781b8b51bf19f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections