General

  • Target

    2024-09-12_1cc00cec11168c8a7a8ca21c0ab0b46a_cryptolocker

  • Size

    63KB

  • MD5

    1cc00cec11168c8a7a8ca21c0ab0b46a

  • SHA1

    86b873aacbd9e550216e310d6e172ece47b9ec13

  • SHA256

    cb2c03a1efe88c6e19312c2e1a4b62a77be0aa8f9b5cd9bb285a379b426bdfdf

  • SHA512

    3ab51a9699f403babac726a4fb4dc8c4bb1158dd4aeae4a003e4c62f7edd086b2f6b2f70f499fbba477a1a7c30032c9585d929855eb28e10c0865b310abaf3bb

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9z9q:0j+soPSMOtEvwDpjwizbR9Xwz9q

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-09-12_1cc00cec11168c8a7a8ca21c0ab0b46a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections