General

  • Target

    2024-09-21_b4dd3443d7efa44f89a610415694aa12_cryptolocker

  • Size

    69KB

  • MD5

    b4dd3443d7efa44f89a610415694aa12

  • SHA1

    ece2a6495a577cc79e5e3c85e0c0078668d15d11

  • SHA256

    527034a1dd90a95d3c33bf0abdeef203b8c6c2248fae391d88ecd3b0045bccc2

  • SHA512

    32f38bd73dbafe8b76733138b812f2d215897137bca5e3fd2234dae595bad9890f4b08ec5f38c68d3dca750339cd72d03d371f24d329223aa7507beb01a5d747

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRj:1nK6a+qdOOtEvwDpjS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-21_b4dd3443d7efa44f89a610415694aa12_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections