General

  • Target

    2024-09-30_096df062214f6424206101a39ec40d9d_cryptolocker

  • Size

    62KB

  • MD5

    096df062214f6424206101a39ec40d9d

  • SHA1

    8046e9494c3523adfd3c4a26d5e4dc3e1263f319

  • SHA256

    0827c6bca5e2b4f65ff1b36eb3b626d0c709c281d2240726fc3944ac1060dac8

  • SHA512

    4a63004a92fa6a835afc885d007f2316448fbb080b36c551017e5837f70540139776a7748d7aa38b7efc7f01d1fb89bcb6422f62ad2286944390dbd75a8ca8f0

  • SSDEEP

    768:H6LsoEEeegiZPvEhHSG+gk5NQXtckstOOtEvwDpjhBaD3TUogs/VXpAP3qhv:H6QFElP6n+gou9cvMOtEvwDpjCpVXhhv

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-30_096df062214f6424206101a39ec40d9d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections