General

  • Target

    2024-09-13_a8aab4e569c8e39b3d1417ee30494785_cryptolocker

  • Size

    42KB

  • MD5

    a8aab4e569c8e39b3d1417ee30494785

  • SHA1

    203a081acfd66dd3d7e5462beb63118714b689bb

  • SHA256

    9465dcaa72afb29042767c469164599b4c026099c28f485fbc2bbf41a6f57601

  • SHA512

    9ca0c401ce02b3f2c37b122bb43de2fe97e30fbb2f746464d217e56dcdf6c96cf10b2fa681d20947a23b3c30d65e3b403628585ff2e029789bf585ac1937ba29

  • SSDEEP

    768:ba74zYcgT/EkdCQgpwXFXSqQXfj0xKoWkR:ba6YcA/Xk3wXFXSqAJwR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-13_a8aab4e569c8e39b3d1417ee30494785_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections