General

  • Target

    2024-10-14_409b4d813534dd78816b2a5bcb3dd7fe_cryptolocker

  • Size

    37KB

  • MD5

    409b4d813534dd78816b2a5bcb3dd7fe

  • SHA1

    d4820b43f2ae98bbfcd20511610f166ed5df3c52

  • SHA256

    66b8da6a37f256e656ddb587acabd992a5502c83838aaa228675a4cffde259a9

  • SHA512

    dbc2d3892146ac0482c905eb17e758cee2c2c4e3315ef2232e2c070d2062ae2fe87d778f4c6d50050bff409b62380045f50e8facc1e11f53f7e1d320206805ad

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITJE:qDdFJy3QMOtEvwDpjjWMl7TG

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_409b4d813534dd78816b2a5bcb3dd7fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections