General

  • Target

    2024-09-13_d16e93a9ab89344825039db46feb84b5_cryptolocker

  • Size

    40KB

  • MD5

    d16e93a9ab89344825039db46feb84b5

  • SHA1

    12536fc84eab323c31e794199116e399b1314063

  • SHA256

    f6154503932ce3e0f7e1f203e978b5e73eb139211cd2c79496bbc31412a79ef5

  • SHA512

    b62ba8d3d5bf43692b7d5ad43b035ff3077bd02bd0c776a0a9d39178a36114d6df00f9af3b666f83e2176243478da911a7bed4275df457d6678a80399e2365d8

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYan/N6:qDdFJy3QMOtEvwDpjjWMl7Tdn/E

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-13_d16e93a9ab89344825039db46feb84b5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections