General

  • Target

    2024-09-11_4d19e1c462923011304bbadb0cb367ab_cryptolocker

  • Size

    90KB

  • MD5

    4d19e1c462923011304bbadb0cb367ab

  • SHA1

    e27f1bbd76fb2061544dfabad986e1a4a492badc

  • SHA256

    91e9f06548cab0c2c48fd3d8c87ea6d6d3106bf7ca4e2b242338735ceea1e579

  • SHA512

    c1698986551b764e34f89be372e95c9df01f0b9504385601bdbbd8a5e150b3a0b247d34f028f28d25765532c87a2dc0c84dde6ef349f854e49413d5747900ede

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy8tybl8:zCsanOtEvwDpjb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_4d19e1c462923011304bbadb0cb367ab_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections