General

  • Target

    2024-09-11_d409ee442084a1f615f677ac61fceabf_cryptolocker

  • Size

    95KB

  • MD5

    d409ee442084a1f615f677ac61fceabf

  • SHA1

    b9ad2a50d05098a3e5f6309eb52e1a6c572eb178

  • SHA256

    7a3678e0ed76b50c48a569b61768b5c0e97aae4760d2af861c762dbf4cdb9cb5

  • SHA512

    e1be8c9fc4894d1b248a8d7d4cb60943014ca197021ca7be402f1c7ff87b428a5366dbea34535461f1adc5c844169185ae37eb5c78297bf998ed48d800078220

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kAd1:zCsanOtEvwDpjBD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_d409ee442084a1f615f677ac61fceabf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections