General

  • Target

    2024-09-07_c3a3d5a48d2596c7b9b7bc1eb2b92e93_cryptolocker

  • Size

    40KB

  • MD5

    c3a3d5a48d2596c7b9b7bc1eb2b92e93

  • SHA1

    12d142bcbe6b02c8c513b796d227baa13819e8ce

  • SHA256

    db34a422afc7fa8d93c6a896377a183be4be940791a018787931fe06fcd41351

  • SHA512

    ac76ce65787464570086ca19a9533218b39f4e142f85fc9ad64492472e795be04daf9c5af0993f3e8424e0a5ad7bebdc1c0f52f08f04b57189369f3f60574a7e

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiT:qTJu9cvMOtEvwDpjppVXzRW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-07_c3a3d5a48d2596c7b9b7bc1eb2b92e93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections