General

  • Target

    2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker

  • Size

    46KB

  • MD5

    871823b4dc5cda1e5f7b193efc521380

  • SHA1

    2620f4926c09c7c2f9724a29658ff5daf8d4ea17

  • SHA256

    0e5dc99e1f7715b61d3b1c430659175fea62fb883c22a9e9855a119d7530968f

  • SHA512

    421ebbbd8af601910c4c5fd2c92c74395c08ff1af06b572fac27515b36d3e06c22da4d8aef4260519f19359d7e4e10737b567c6b0c364af7b559f6b799d3fddf

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqM:bODOw9acifH+YM

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-30_871823b4dc5cda1e5f7b193efc521380_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections