General

  • Target

    2024-09-15_bbfc176a5f3ed96537811728e61e948c_cryptolocker

  • Size

    63KB

  • MD5

    bbfc176a5f3ed96537811728e61e948c

  • SHA1

    f1f33eef91e24ae0cfb2badb50e9f2b89d8ef460

  • SHA256

    dbd08bce3f3384d4a0e6dcf6e0ac8d1c7e40b8cdc8a959addeedb0457b2de8c8

  • SHA512

    c4485e71f510efd010c259d16aae8004868deba4b73f7f4457133b809035d8c68cd0a5c9fe70f303d8e081613e10648ff69b7ff5a7121de6f4ee52c8707d6674

  • SSDEEP

    768:0Qz7yVEhs9+syJP6ntOOtEvwDpjFSXOQ69zbjlAAX5e9z9w:0j+soPSMOtEvwDpjwizbR9Xwz9w

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 2024-09-15_bbfc176a5f3ed96537811728e61e948c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections