General

  • Target

    2024-09-11_cf2a4d33559a8d5313fdd6287f79e5f7_cryptolocker

  • Size

    42KB

  • MD5

    cf2a4d33559a8d5313fdd6287f79e5f7

  • SHA1

    25b12035af63d205218d8163fe1ae7822494c07f

  • SHA256

    f40bfb017d1c6db81fb6b58354f5f9a1f9ac9833111070cc81fa890255bf7db5

  • SHA512

    a83e13e5308e1298f38f852270939dce3325e0f658342dea65f1885fa4b42c9a18e090f97869220dccff5898b4fce360f850933bd1d41ec8bf5a8d482098e167

  • SSDEEP

    768:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoWl:ba6YcA/Xk3wXFXSqAJR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-11_cf2a4d33559a8d5313fdd6287f79e5f7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections