General

  • Target

    2024-09-14_20b85caed38687058aa232a88539b0b2_cryptolocker

  • Size

    64KB

  • MD5

    20b85caed38687058aa232a88539b0b2

  • SHA1

    79effccc5ee1ed674b9a5576fb9562e78471f17b

  • SHA256

    e9eb853239e903adf78c5b41550f194e1d1751d480721dfdfafdea23e09a5864

  • SHA512

    3dddb938d31a1315dcc43f8fa6e45f6a72a25c2eab361e1675668c366f20a06b93a2c32f135b89fbac1f3825707f64750287be748b8aea4b4b4fdab5d69cbb13

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9zi:0j+soPSMOtEvwDpjwizbR9Xwzi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-09-14_20b85caed38687058aa232a88539b0b2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections