General

  • Target

    2024-09-28_36f50f15f50eda0fa5c890fb8edd1888_cryptolocker

  • Size

    54KB

  • MD5

    36f50f15f50eda0fa5c890fb8edd1888

  • SHA1

    98142fa086400948a11bc467e1ffeebbecfebfce

  • SHA256

    bd32aa01b95ea047c7df76a13309165a9266966a03806b22d2f3afdbb8c83e7c

  • SHA512

    1bfa88f6dc1905834cf697e929cf6b441d6b52bee45a51af69cc9fc3dff7fdf2c17db5bdcfd8b6e55e047dc57368d0029f2ac710164f1bcda479bd71c9259a73

  • SSDEEP

    768:76LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axcX:76QFElP6n+gKmddpMOtEvwDpj9aYaG

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-28_36f50f15f50eda0fa5c890fb8edd1888_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections