General

  • Target

    2024-09-08_4c1d4b8f5ef990a4f1921810744a683a_cryptolocker

  • Size

    37KB

  • MD5

    4c1d4b8f5ef990a4f1921810744a683a

  • SHA1

    91c931becd84d7b33a72d6343f925d7c2b853e11

  • SHA256

    256a129c435719788a27ecd202045f0fb0c1da7e6c23ff75b361672bf5baaf53

  • SHA512

    8047c15e38fdc20ee6028718c98d4c05b776752611c14cd41cb13159a3842def200df9f8c4e2dd50b7bb7514048b680737f51b2b8bbdd671c27911d6a1c18d59

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITO:qDdFJy3QMOtEvwDpjjWMl7TO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-08_4c1d4b8f5ef990a4f1921810744a683a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections