General

  • Target

    2024-09-08_42f6f2b1b04d33a0cabb3660622207fb_cryptolocker

  • Size

    55KB

  • MD5

    42f6f2b1b04d33a0cabb3660622207fb

  • SHA1

    219f748eaf29760f7b7a19fd1a38dcb2811d04e0

  • SHA256

    44a1645334547a654374d7454ebd7906da29b972805f5bb9cab6ad950af53d80

  • SHA512

    e6101183882c83c0a9a3c0a1223f295567658a8378c21cc9ef111e11acfde981332aa05c45c9cb5e63554b814d4e3918c418eab0ed1791b16c19236f643f73a0

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkahN:z6QFElP6n+gKmddpMOtEvwDpj31ik8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-08_42f6f2b1b04d33a0cabb3660622207fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections