General

  • Target

    2024-09-04_c372cbf284d7c865cd886c45089d5f08_cryptolocker

  • Size

    59KB

  • MD5

    c372cbf284d7c865cd886c45089d5f08

  • SHA1

    13cedf720cf7dc0cf1c45f642bbb92ea7fc468a1

  • SHA256

    9a73518380a3d5659c5d8c6e93ff858ac406e97c650ecc09e14d3190f47d4927

  • SHA512

    e1507dac92ce7528899f3cb282d76e8235aa41f7a67a8b0aa392fafafa4bf46baa9b2d184760713df50aa503a4a8c60cb6e9ce25819fcb2291258ba80555bf27

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qqK:H6QFElP6n+gou9cvMOtEvwDpjCpVXhJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-04_c372cbf284d7c865cd886c45089d5f08_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections