General

  • Target

    2024-09-05_fa4b63f198e90416c3f6aa48752f3e38_cryptolocker

  • Size

    57KB

  • MD5

    fa4b63f198e90416c3f6aa48752f3e38

  • SHA1

    383838e11d0f9f6cf49304555665dcf8fd859258

  • SHA256

    8772b20b686420779437910339e4b29da6c877d0434c25546e2fe11081bfed97

  • SHA512

    24851640f71394bdd0fbece91c63dceec0948afd51144366e37ea0feddd0bd52c2c2f3af7ef6de2507235344e09805cf4b391409a47a54e14a3dcc29320ba042

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlY3:bP9g/xtCS3Dxx0L3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-05_fa4b63f198e90416c3f6aa48752f3e38_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections