General

  • Target

    2024-09-21_216eebdf3f12c4c7870b53cce741f059_cryptolocker

  • Size

    96KB

  • MD5

    216eebdf3f12c4c7870b53cce741f059

  • SHA1

    74825caad74f2540aa38bd83f380649250310f44

  • SHA256

    4a4a5f5c5f6cea1367b4af7341bd432c8937a40d2961064ce54345cd8495024f

  • SHA512

    0eca20d3ae214d69c1c8ce8d82e1e918bb4d39c3d3c390974f429a07531b1b300c377c57b9c14cece6f38793ab1f2c17e8571d130ceddf15adf0ac2e3b52a276

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/kOw:zCsanOtEvwDpjB6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-21_216eebdf3f12c4c7870b53cce741f059_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections