General

  • Target

    2024-09-21_42aced208c789a794cf5eb2ab9fc3723_cryptolocker

  • Size

    55KB

  • MD5

    42aced208c789a794cf5eb2ab9fc3723

  • SHA1

    a5f77c16b6f84507e230afb672f3dae93e78e752

  • SHA256

    f6f9920ea4bb4f1c8e01c690efe90ed9f7e90118722495c450fa5b1b05c7cf83

  • SHA512

    e3d2db4280ef99bfb0498bc95712a575069b0f391d2042f07585ffe81bfac2641b366c171cae6c6d37e7ff2b2ea941e28857bfe4764d12797412f71438944be5

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOkaQz:z6QFElP6n+gKmddpMOtEvwDpj31ikFz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-21_42aced208c789a794cf5eb2ab9fc3723_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections