General

  • Target

    2024-08-29_52a20d87f9f6f1a5916d603bcb897dd3_cryptolocker

  • Size

    58KB

  • MD5

    52a20d87f9f6f1a5916d603bcb897dd3

  • SHA1

    78c3ba3366c3ac33df2bf7a781e055f8e61a4d96

  • SHA256

    83b0e76a44c25153513855d424466eef48691d3ba75c6956799e2496a5c6a6a1

  • SHA512

    24c64aa1e5e6cb4143d60ee9b72e354c565c20c9a771ee96268f2cd69e312631488b95a7c0b4c1800f30a5a4b4bb32fb15bf83775a075bf8f27080cc75fa1edb

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcS8:bP9g/xtCS3Dxx0A

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-29_52a20d87f9f6f1a5916d603bcb897dd3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections