General

  • Target

    2024-11-09_4c7064174b872b8d7086694704e135c7_cryptolocker

  • Size

    39KB

  • MD5

    4c7064174b872b8d7086694704e135c7

  • SHA1

    779d5c995094badd408f22b1a8e7b03caf2beb83

  • SHA256

    56b9f616185b04f68953da9b8438ddc36c35a89f43ee17468fd2884aec9eab45

  • SHA512

    432363f2424a2240cc8969e3c2fc0550030cb89707e8cfa4fe3d216f41c2a926f359dbc8817a8a40d191396827637ea64fa7c735c14b941e2999d5b311c10c22

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITW:qDdFJy3QMOtEvwDpjjWMl7TW

Score
5/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-11-09_4c7064174b872b8d7086694704e135c7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections