General

  • Target

    2024-09-12_17cc3bfe40b87520002d2893982c6bb0_cryptolocker

  • Size

    36KB

  • MD5

    17cc3bfe40b87520002d2893982c6bb0

  • SHA1

    8fe82507bdcc1325a45fd3643065091a2bcc922b

  • SHA256

    e04afc873e937824ba66e4351e5f2fb267914eeee05d8b0ff0f9f5b497376a65

  • SHA512

    7a4d9b2821e69b4178e4d3938c07cac59a32bd63594944b84eb97e0f34754b7ef9cc4eafc2c47360d1d89981259ff5c739b69a96fdbb35aefbf8317af5e3f8a2

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT/0:qDdFJy3QMOtEvwDpjjWMl7Tc

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-12_17cc3bfe40b87520002d2893982c6bb0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections