General

  • Target

    2024-09-12_4ed10312c037ce251389b965b87abddc_cryptolocker

  • Size

    54KB

  • MD5

    4ed10312c037ce251389b965b87abddc

  • SHA1

    bd8f30f2d419d7f4e79582f35516b380e33bd479

  • SHA256

    82b7617a222bdc639dfc22c12f5649ae1659c921b0cd899bb53ceb56be408d35

  • SHA512

    2604154d9ac67a13fba847b3cfaee8a74523c759f3d8159f2208c3157fdfd95ec62bad1496521318655d8b760b2b450ed6c5f7533f0349bd84d38b5482d721b1

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFP9:b7/y28wZEjbnouy8G76iH/NLpH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-12_4ed10312c037ce251389b965b87abddc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections