General

  • Target

    2024-09-09_26e429cdd1f1bb112cf49afa3c45aecf_cryptolocker

  • Size

    59KB

  • MD5

    26e429cdd1f1bb112cf49afa3c45aecf

  • SHA1

    3688c0264b7f3b9959413b3b41228c089101f999

  • SHA256

    ae1e0088dd56fe26fad44e5a0249879e69847d908ed459baf956719033b664bd

  • SHA512

    4a96df6d069f94a2f0971801345964fc62d439beda2ebe9e4c941cc1d9392f6f1c28c800da6a5a24303af327fa6c90395be3d071d8c865fa4eef88af5be788f1

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlgcS8:bP9g/xtCS3Dxx0g

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-09_26e429cdd1f1bb112cf49afa3c45aecf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections