General

  • Target

    2024-09-11_296af67f485a01beebc1c8d871adfebe_cryptolocker

  • Size

    62KB

  • MD5

    296af67f485a01beebc1c8d871adfebe

  • SHA1

    f2bcbed4626754e2ccf34a8c9317fb743d29f602

  • SHA256

    6404811054f2ed8ac51adf91064c529901dff4ece05e84877a158811aaa4bf67

  • SHA512

    070661321230665675a0ebead49314a5037f5ee89a815fbf5b2548e7d543ccf157a66cd31a564229650699371f82469cfe463cb8f889825fed524bfed5105416

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLam5axK38noysh:T6QFElP6n+gxmddpMOtEvwDpjwaYaQ84

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_296af67f485a01beebc1c8d871adfebe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections