General

  • Target

    2024-09-13_cc40b53f68c6fc9b50d87c322443a90a_cryptolocker

  • Size

    61KB

  • MD5

    cc40b53f68c6fc9b50d87c322443a90a

  • SHA1

    49c5a8e672744be830916ec0811837fdea2f7789

  • SHA256

    d0ffd7c4cda43e88b6f65ec145e8fbefdcbf5e1d6f02e8bd5f2bffc4bd1d354c

  • SHA512

    11b0284d42ef793a6505b1b545cb8b582e6446565ab71d2e5fc7b0775c0d292bfbc6949592338a6b5688a955d34207f976707416f9de3f789c100b51225b3d3e

  • SSDEEP

    768:f6LsoEEeegiZPvEhHSG+gz5NQXtckstOOtEvwDpj/WaD3TUogs/VXpAPWRiN:f6QFElP6n+g9u9cvMOtEvwDpjnpVXzR8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-13_cc40b53f68c6fc9b50d87c322443a90a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections