General

  • Target

    2024-09-11_cc499904c4e80a772f7ff475c3ecf114_cryptolocker

  • Size

    95KB

  • MD5

    cc499904c4e80a772f7ff475c3ecf114

  • SHA1

    4679226f6f736609695303eda22d9eb7586f4d32

  • SHA256

    4d5ef8795ece83632582a5fdab1b92ae70b9acb3b34d4fcbf59831c55d3db1a7

  • SHA512

    b69f4c57cea2f39f4f6061898887819cb09559420c6d1424a3e159c4248d9298b41b94720eccc0a2a8d2cb18fd1e7d0a89a974637ccc6762cda67cacbb6effb6

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kAdC:zCsanOtEvwDpjBg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_cc499904c4e80a772f7ff475c3ecf114_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections