General

  • Target

    2024-09-09_3a22a0a5244e40432e7372b7643c043b_cryptolocker

  • Size

    55KB

  • MD5

    3a22a0a5244e40432e7372b7643c043b

  • SHA1

    3f3eac5d607f8a3f58ca0e5d1bcdbe845039d73c

  • SHA256

    ecf6fadacce18ce8a0e91027d1c96129678bc73674310d68d5feb0352b4b4be7

  • SHA512

    0495b45e23c3124c61898c997c1acd7206da10a75f1a223e0b0fbe558aa963af6451749d6c047fd110c6ddb12ee570ef27fe8ceecf138a4f8e3501be86fa74c6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgn:z6QFElP6n+gKmddpMOtEvwDpj31ikgn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-09_3a22a0a5244e40432e7372b7643c043b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections