General

  • Target

    2024-09-11_f7f37dc9d2fb372eb3f264f7a53bc9e3_cryptolocker

  • Size

    40KB

  • MD5

    f7f37dc9d2fb372eb3f264f7a53bc9e3

  • SHA1

    7ecc91ef03b45bbeac6b695c2a1e48a7565a585e

  • SHA256

    80f61295d9560b6fd80517c26ea59bf70b7f39cda1e7c99115d86e970d606ece

  • SHA512

    d2cddce66d50b39f6137b4b1c3a19fd6d88584c98584342cb942d6af60b41d27ae8a9c1b05e47e034f5e25568eb6863ecbf11ed79de6b1b1aa2d46c086fb8463

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITx:qDdFJy3QMOtEvwDpjjWMl7Tx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_f7f37dc9d2fb372eb3f264f7a53bc9e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections