General

  • Target

    2023-08-22_38becbd82bd76b214fe59d29714871f4_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    38becbd82bd76b214fe59d29714871f4

  • SHA1

    4fe66378e9267cd4697094c84b7a6ffedbe722c1

  • SHA256

    270365b2501493dd7dabc026a40fee9b0f2457d0e73f4e243eb0154e3e3611e3

  • SHA512

    f177b641109c31d23b5dc190d63a88adc13434e9af0b9e61b935388d6d584cd95224a680d61dfd56aab32f8b65a4e38fb8747f930dacbc125a2985c41ef989a8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUC9r:1nK6a+qdOOtEvwDpjL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_38becbd82bd76b214fe59d29714871f4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections