General

  • Target

    2024-09-13_ce9c94bd5e3fd2e6987b5387b1afe13c_cryptolocker

  • Size

    57KB

  • MD5

    ce9c94bd5e3fd2e6987b5387b1afe13c

  • SHA1

    9f164e5433f31fa20b17811ca80e300a15db10f8

  • SHA256

    f53e072e321c51fc5996c6f0a57d33e05106b282d44789066cf9bac4eba3eca5

  • SHA512

    9955597ee9934293c71b938e472ce15c11852ffc28d1beb22ac3f03b60bd3b220c146214de10bdcc73fe48b22324c90946b45849d2d085e7b46e75f8ab6ad163

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlbQ9mER:bP9g/xtCS3Dxx0AQU2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-13_ce9c94bd5e3fd2e6987b5387b1afe13c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections