General

  • Target

    2024-09-12_13b01d3d289d56902f0cef63f39f6497_cryptolocker

  • Size

    54KB

  • MD5

    13b01d3d289d56902f0cef63f39f6497

  • SHA1

    5e26e34299bb271fbcfeeeba4637659f1f4a3975

  • SHA256

    1ff9c23131721ef3da72392334d28e82f8a7a16de1d0e9e0a9197d73c671e0e3

  • SHA512

    84525bf7ee294699d72322c15cfdad1a4177ce2c87e997fd47189f919fe0162a0f95f3b089e36e2cfd580feaba5c556da35a2709ce5be03e7e54e32782954f1e

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPV:b7/y28wZEjbnouy8G76iH/NLpf

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-12_13b01d3d289d56902f0cef63f39f6497_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections