General

  • Target

    2023-08-22_2afa10b7642be3283c1c79fc608f1d00_cryptolocker_JC.exe

  • Size

    145KB

  • MD5

    2afa10b7642be3283c1c79fc608f1d00

  • SHA1

    7bc1ae9f7f37e0624caf92bf5367b24e19252445

  • SHA256

    e34fdb1e1f2bccacdfe8b5efbc75685833c58816ee9f6430dc1c06aa5ea0d465

  • SHA512

    a06c9ae808ddf851a4a42b52c09e675c78f9d61e040237ee0f07cee8e81b563ddb81d6d875a497038d91a2ee37a644c9023f7974e86c00225b43eebf6c41dcf4

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgp699GNtL1etD:T6a+rdOOtEvwDpjLzD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_2afa10b7642be3283c1c79fc608f1d00_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections