General

  • Target

    2024-10-04_989d69eaa89a72c914b8634564037c8a_cryptolocker

  • Size

    28KB

  • MD5

    989d69eaa89a72c914b8634564037c8a

  • SHA1

    22a7627d738ccdc29effdb91bd4cd5d371699c68

  • SHA256

    d760fd6eddaead80784dccebaa8f2295b0b8812b0d8efdcf98c2b9d5b25ca2d3

  • SHA512

    e1404d9d8fe30c0de980eb8f365095cbaecaba13a5ed290e665307d2152376d32a7d096b46040cb6a5a0c41b243d19477e8e8a57c2dfef493f07ab95b094b85e

  • SSDEEP

    384:bFgFQrdSmuQ8WFqxpj5cpyIuYxVe3FSr+OLfjDp+0g/HNblX7QCOBqTi:bFgm5zusFUB2preAr+Ofjg0STX73OBqG

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_989d69eaa89a72c914b8634564037c8a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections