General

  • Target

    2024-09-19_9043bbdba8378d5d30c730fa2834f805_cryptolocker

  • Size

    54KB

  • MD5

    9043bbdba8378d5d30c730fa2834f805

  • SHA1

    3645f9027bb5d0a9ad007124d218d9a428153349

  • SHA256

    9feebb6e4944653f8f639fdf9ddc7115af688c86272e4e2c4e1adf7da44ba368

  • SHA512

    f6e560628726080bd3b6f9559ed3b3b2d6eb248273b0cc451c9cea1e7d24ca4a5ec458c48b729bffc34166e6b31ca03383604eab643e2c324018bcd844b2fb70

  • SSDEEP

    768:bco/2n1TCraU6GD1P2wZEjbhxnbcuyD7U9kXDn62tH/1/LpPFPZ:b7/y28wZEjbnouy8G76iH/NLpz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-19_9043bbdba8378d5d30c730fa2834f805_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections