General

  • Target

    2024-09-15_be1c736ce599a6b38917dbd0a376e371_cryptolocker

  • Size

    55KB

  • MD5

    be1c736ce599a6b38917dbd0a376e371

  • SHA1

    422b4ed9ad057e3bf9fd8266e43ca15a2d78cf5f

  • SHA256

    3364cb5d6d3631a5b3e39034e6e7ae65722a7203efdacb9974db88778c9d776c

  • SHA512

    50de63950a4c484b19ad76079f2516596da1819c174dec64bd03d23440fe721d5040a4194c4b9f7276b10d1de4ea63ea87b057b410fe6e8864a37ad81ffb831d

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkahi:z6QFElP6n+gKmddpMOtEvwDpj31ikn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-15_be1c736ce599a6b38917dbd0a376e371_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections