General

  • Target

    2024-09-20_d6fa7a6b9d7263b8e5a261c260b1c551_cryptolocker

  • Size

    55KB

  • MD5

    d6fa7a6b9d7263b8e5a261c260b1c551

  • SHA1

    a1a86349debabf65f2a00d1d73d773bfcc032c16

  • SHA256

    6cc60a14885808f0e6feb5e505b04fe6ec3b471cc9bc7e3f0ff19c12dbb350d8

  • SHA512

    b2464bb1560f39f8041c13ba0943fd7e25bc9ef345a45494796a7858307f757c9388e5f4c1d362d4fba0b2792a103f6a90303fb54aaf9ffd5969a4f0e8b3a96b

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOXMqO:bODOw9acifAoc+vUO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-20_d6fa7a6b9d7263b8e5a261c260b1c551_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections