General

  • Target

    2024-09-07_d4efbf91c824bf20fb136e417104006f_cryptolocker

  • Size

    87KB

  • MD5

    d4efbf91c824bf20fb136e417104006f

  • SHA1

    d732bff9f496baeb4a2970292eeda4af5f026e20

  • SHA256

    21e085ae8992dd1ac6e2bc52baa1d562624fc15275e53a2faaec86f6a52e84cf

  • SHA512

    207aa1c05857205d40a03c230d352458c72797e562e1b79037e4e42b2e9419f1bd1d30598492c8bc5498bcaa6c3f1849d50c23264c0c49eab7fc2a07e83cf5b4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM5Rz:T6a+rdOOtEvwDpjNi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-07_d4efbf91c824bf20fb136e417104006f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections