General

  • Target

    2024-09-19_24423a07e2cad8f192e1a32b2ff98c17_cryptolocker

  • Size

    83KB

  • MD5

    24423a07e2cad8f192e1a32b2ff98c17

  • SHA1

    d8bb50212294b00e52242563f6afa8cc6ad7918c

  • SHA256

    926a47e346ae6889bbef8bb9bcb0c3bc6642f969491c7483af2abf7b43039a46

  • SHA512

    bb10edaa497508e9cd982d54d0d044a4354e0c8b4e8cd6db210ce0481dcce032a485405864d12d2de31938f221e83fed34bc083531e4df631ebc3257c1a31b49

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKXgXMSMEQ:T6a+rdOOtEvwDpjNO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-19_24423a07e2cad8f192e1a32b2ff98c17_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections