General

  • Target

    2024-09-07_0c672be9e43be4649f3ce3e5b61500f9_cryptolocker

  • Size

    72KB

  • MD5

    0c672be9e43be4649f3ce3e5b61500f9

  • SHA1

    e4efc4237a471ddcb3d472d32d139e9fc267aef3

  • SHA256

    37f3c57a2783e7c81cb73925afcfd565ef837ffcefe3aafd6c91f0868b18c8ab

  • SHA512

    46e44e404b98d25317235dc6a473718a514e5a4951f6a828f04a2c2d0473b7f736766d7027ff950dfd5be3d50485470829931816cf1f440568da76dac3f171a6

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9e:C4Q2c94OtEvwDpj4H8zT

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-07_0c672be9e43be4649f3ce3e5b61500f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections