General

  • Target

    2024-10-14_4f9ed70679f53961831e3b293b678637_cryptolocker

  • Size

    39KB

  • MD5

    4f9ed70679f53961831e3b293b678637

  • SHA1

    dad5632d238c749f3b5d42d3930975b581877827

  • SHA256

    064c736b1d81d58681e7bd8c095b3fee4af8051c1a796d5f5cdc880a57d7700b

  • SHA512

    83be08684d1eca61a0f16a7c43ff7d55eced9151d15c65237623ff8ed774e40cea1ae4b2965d9de14909eddbdd67c203f1502c49f85017b3bdd86595024d3c62

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkIT1:qDdFJy3QMOtEvwDpjjWMl7T1

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-14_4f9ed70679f53961831e3b293b678637_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections