General

  • Target

    2024-10-04_940e88cf4a39bbb3ebed5cdd823fe8c1_cryptolocker

  • Size

    38KB

  • MD5

    940e88cf4a39bbb3ebed5cdd823fe8c1

  • SHA1

    c3a3f4b13f400ea57615c1c0c8bed8790e307e10

  • SHA256

    7fac07ab15e242880b0c93b222c8bd736b18432853646e289c0d61b30f2877db

  • SHA512

    31038806d86108e09353983b85f84b115e59bcb26d0fa1ab8bc744cbc810e5637dbe35e0f81eb6ba2fe1b54a747d955d5824570587768c2136c29668dfda33ce

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITc:qDdFJy3QMOtEvwDpjjWMl7Tc

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_940e88cf4a39bbb3ebed5cdd823fe8c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections