General

  • Target

    2024-09-01_5b4f23f864512446883da897a968d191_cryptolocker

  • Size

    61KB

  • MD5

    5b4f23f864512446883da897a968d191

  • SHA1

    cd8117b3b376c03b557349d0828301457c78196e

  • SHA256

    c7b4d4a593d832cc6ea858bb9a5946f6426ba368bc7a43da05e4aff07cd1dd3a

  • SHA512

    cce4b9a97abac8c8e8ce0c5b442afd8d64d9816f0c1e6506f41da99dea01397f3a87af92c3e51e797c51a87bcb021d0920087e8604e8be35ad11ee1d479e847a

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qh/:H6QFElP6n+gou9cvMOtEvwDpjCpVXhh/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-01_5b4f23f864512446883da897a968d191_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections