General

  • Target

    2024-09-15_6f00942b4a9d88606d04f0dade0c9c4f_cryptolocker

  • Size

    52KB

  • MD5

    6f00942b4a9d88606d04f0dade0c9c4f

  • SHA1

    de785a25e9a3c2a2b609bdaaef3d0ce27d09656d

  • SHA256

    91cf505faa79b5b245a2cb12e2b297eb6b844b2677272c07a56bdf13895c5cf2

  • SHA512

    7b4be8ead8275154f410cec80810f8412451ed48cbb4075fdad7f34c54364bc878113d5315d320727991a968cc5bc09dde70393d35c1030d7cf4eb50c50df7a3

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtXz:bODOw9acifAoc+vXz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-15_6f00942b4a9d88606d04f0dade0c9c4f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections