General

  • Target

    2024-09-11_29633bd0e5fca302c059f71e5bee8e43_cryptolocker

  • Size

    55KB

  • MD5

    29633bd0e5fca302c059f71e5bee8e43

  • SHA1

    9f228dff391b3282d5bca00eface7d4ea3842935

  • SHA256

    2b0dc688e3d4aa40babba3ab8b10f92b4f6468b3f5c509627c98d4f41372b9bb

  • SHA512

    818c30f40774ab37f61be59f669410615758df8efde946c592a84c1545d1d289088162a15a98c3c9f1e8ba08000e4b28be05ef64323c077f6943787f7e081ee8

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgA:z6QFElP6n+gKmddpMOtEvwDpj31ikgA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_29633bd0e5fca302c059f71e5bee8e43_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections