General

  • Target

    2024-09-09_935fef10c8cf485dc15e6975cb72b39e_cryptolocker

  • Size

    40KB

  • MD5

    935fef10c8cf485dc15e6975cb72b39e

  • SHA1

    b572c93fa6588274e70fb635eef265da89ac62a9

  • SHA256

    1147a8394591d7de45c66454d9b9202787a13f3dc3b81db9f468e79300b774c2

  • SHA512

    8d6708f8ab4b42cb57a7f37e3f8f4b91bf9f2a7d870589bcf3e3defb85754f98a4dcf2109a883dd732086ad7b4acbee565ac95d1bbf7c8f5b3c9f37f15ae09f7

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT+x:qDdFJy3QMOtEvwDpjjWMl7TO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-09_935fef10c8cf485dc15e6975cb72b39e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections