General

  • Target

    2024-09-11_55e35d8a666d7a1442adfa54172d0fbc_cryptolocker

  • Size

    40KB

  • MD5

    55e35d8a666d7a1442adfa54172d0fbc

  • SHA1

    4b26e9e674be20b23c6c1dcb012a87f07d5e0834

  • SHA256

    c03ac9c9a2bedbc7586d93e8796b9a81e39532dad1d9eb9e2ce636478a6331a8

  • SHA512

    4227602bd97279a29885291fc6e860b83b1f1a6dbea8a395c8fff3fb2e80f8a00952293160c410f9999bc13ad6949b456c0fa540faf0ef4dbe676c45cd324e87

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/NB:qDdFJy3QMOtEvwDpjjWMl7Tdn/r

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_55e35d8a666d7a1442adfa54172d0fbc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections