General

  • Target

    2024-09-05_6a86c68316e4fe53b8d6ccbbbe8830a9_cryptolocker

  • Size

    43KB

  • MD5

    6a86c68316e4fe53b8d6ccbbbe8830a9

  • SHA1

    f5bc2384b94b04b510454f9886a6ef25ea709d4f

  • SHA256

    159b6f17deb48d7d059418fbd4eb2b106ffb4192318caf1a6aa76c5c0b42afb8

  • SHA512

    a55bb00c457a789e4c2f7d79af1ebeea52449212dc312c7269b8a2e9a7e79b5700b656f5b7c85523e4fc2ea8a60f92b8ff70c0491639d4d6c8864a64f39b22c0

  • SSDEEP

    768:bO74zYcgT/EkdCQgpwXFXSqQXfj0xKsmHBd+:bO6YcA/Xk3wXFXSqAJg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-05_6a86c68316e4fe53b8d6ccbbbe8830a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections