General

  • Target

    2024-09-07_bbf6bb4cc142020bed084bacc9438720_cryptolocker

  • Size

    83KB

  • MD5

    bbf6bb4cc142020bed084bacc9438720

  • SHA1

    53e9e894936ab3499c72baa06d4eb51115318b8e

  • SHA256

    efa3f8e0784f012390b7c6cd1e9a3f65bc111618af6f2f3be73755003cd50001

  • SHA512

    224e02f3ccfd0d3b5cc860844f6ff1c68a78d9cdf0fd39f0a30a5111c21cdfd3901c6a2079d6d6104cb4688ae8acba0f672adef37dc0228c2b13106f8ab193cc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7QXI:zCsanOtEvwDpj8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-07_bbf6bb4cc142020bed084bacc9438720_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections