General

  • Target

    2024-09-07_422a4a2d620d42cee573487f71416663_cryptolocker

  • Size

    36KB

  • MD5

    422a4a2d620d42cee573487f71416663

  • SHA1

    93c29764d533c1211af75fb8a922e6e4e227ad40

  • SHA256

    a38acadd622db3a79b0e70e47c10594b958d4dc98251ab33d9caa2c0097968e5

  • SHA512

    661f4597e0c184b039a3961df6a22064bf8e844ec715918b5501418834d9e0c14263ab7489b9d8197074e57ed29d8c295375c9af64ddb964fa717e98f435674d

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT5:qDdFJy3QMOtEvwDpjjWMl7T5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-07_422a4a2d620d42cee573487f71416663_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections