General

  • Target

    2024-09-12_37d1f2f8f40f80b8511c8e4f81a435a1_cryptolocker

  • Size

    54KB

  • MD5

    37d1f2f8f40f80b8511c8e4f81a435a1

  • SHA1

    615f7ed165dfde285b59f7db06a0a44de0b0fb00

  • SHA256

    c2bcb377b580f7870df1b5d6f13799fcd7ef998cdbd3c3379adf95cfa1afd35d

  • SHA512

    425c6543d96ab515b7a29d71b85c77a5f17e088d18208035275b87ae55188be1904225a81c08c5b735de227b3b09d7c8b4ecb553c2481f341023ec9e70dbbdfe

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPz:b7/y28wZEjbnouy8G76iH/NLpp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-12_37d1f2f8f40f80b8511c8e4f81a435a1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections