General

  • Target

    2024-09-08_e226bd093f442d7b5d30edf8b468a1d9_cryptolocker

  • Size

    80KB

  • MD5

    e226bd093f442d7b5d30edf8b468a1d9

  • SHA1

    b346c78ade9299a5904950ce499c12766e198856

  • SHA256

    ff480d28ea763fdbafa45f6e7ad05d87217b6a5eb1cfd3a87f4c4c81da555c9b

  • SHA512

    7b3ac78752c4da9e691fd0d6f2dc02d458acac9a583b4ebb3b0bfca42ba952103fb45e52ccd47f39a77e13491e269995ea08ef6e00a3e03ad9d63e18a245fa0c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuqdK:T6a+rdOOtEvwDpjNcf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-08_e226bd093f442d7b5d30edf8b468a1d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections