General

  • Target

    2024-09-11_1409e7ed2da160306ab8a6711aadb4c1_cryptolocker

  • Size

    55KB

  • MD5

    1409e7ed2da160306ab8a6711aadb4c1

  • SHA1

    5a9c990a18c246a404cc4a4775fa6dc1cb374ca1

  • SHA256

    7e9a4ded996aee2f5d7fb7dc051969916590e81879d27b6f91f45ae162f83bac

  • SHA512

    3136743a70a32195b79addb072d411ca9e9db31f4c48e40d643e80c9e64e4385eee7849b821f1202ef9668db800b0a7d2604f19147da5edbf1b24332484177b6

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkgj:z6QFElP6n+gKmddpMOtEvwDpj31ikgj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_1409e7ed2da160306ab8a6711aadb4c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections