General

  • Target

    2024-09-30_f9e0eb380eb5d86b3ca6a9221fafff65_cryptolocker

  • Size

    45KB

  • MD5

    f9e0eb380eb5d86b3ca6a9221fafff65

  • SHA1

    3391e52e80ce141dc4e451447f3738857a9e3fc9

  • SHA256

    6c85336888d58601b38c424aced35d8d66055bb96e4f3373ed46c39fb22baf98

  • SHA512

    85ad9933a35cf3dc4e3f0e7dc263ce29b77efd4f243326548046d7014ed89135b3063ae5d12f84d5d84351294b4604442e77b31a14255a4c112581ee595b2721

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0STX73OBqy:bODOw9acifH+Yy

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-30_f9e0eb380eb5d86b3ca6a9221fafff65_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections