General

  • Target

    2024-09-03_8b9e4a462018e8d51372479df7c1942e_cryptolocker

  • Size

    90KB

  • MD5

    8b9e4a462018e8d51372479df7c1942e

  • SHA1

    6609d93182ccd84203dff7e46f841f4439a57bb2

  • SHA256

    077db80400e0e0093332b242b6e39adaf852c1d3d30be5a582abf4997177060c

  • SHA512

    23b766dd1d5306cd46f760e373b32fa99779253c92e75ed7547c64ba80e0749003a8565728687c1dc971cb1db78e7cf0891a6fb27c5fb4f5683c81a5ef6cd1a8

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAl:n6a+1SEOtEvwDpjYYvQd2Pl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-03_8b9e4a462018e8d51372479df7c1942e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections