General

  • Target

    2024-09-19_fd5bc9c73191281bd2cd3b6a939b12ec_cryptolocker

  • Size

    40KB

  • MD5

    fd5bc9c73191281bd2cd3b6a939b12ec

  • SHA1

    fb0c931d9b96b0ce4d58c8b76010cc8930a0d31e

  • SHA256

    b6b64bad036dae1bb5513351d9e1d718b3bcbf3d4e7191756147f26a299b622f

  • SHA512

    0b1f42b8718a1448977575eb4baa9260b864b94e9b5cd2584106f11790aeca487f094e0a89b010c597c0ae3e1984a69efa1c254a1f687efd62b844ad7dc6924a

  • SSDEEP

    768:qTVbxjgQNQXtckstOOtEvwDpjAaD3TUogs/VXpAPWRiQD:qTJu9cvMOtEvwDpjppVXzRV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-19_fd5bc9c73191281bd2cd3b6a939b12ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections