General

  • Target

    2024-10-04_199be0c1942f09ff4e649e465637fc2e_cryptolocker

  • Size

    72KB

  • MD5

    199be0c1942f09ff4e649e465637fc2e

  • SHA1

    e940c3ad980be6410f58a9f127d59ae08e60d249

  • SHA256

    2160c842267510906d4f81c88a1abc428f45b8f9f914177e95bfe5486484644b

  • SHA512

    792125c485ef5e17f81a7861800c563d5ab03a445e832211d55a3c7e8b2687a42c23e2b9b8a251399d580610ea4edee15a217e58a6e875f7e0ac7ea58df17f8a

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9U:C4Q2c94OtEvwDpj4H8zt

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_199be0c1942f09ff4e649e465637fc2e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections