General

  • Target

    2023-08-22_9bf69b0b615bb6757d84333b821fa3f4_cryptolocker_JC.exe

  • Size

    90KB

  • MD5

    9bf69b0b615bb6757d84333b821fa3f4

  • SHA1

    69ceb4bce0e62a3a7d9f09d28b1e108beaf2c5e2

  • SHA256

    93b70dfa9fac9091f34cfe6e0fe8bb3c786987db6d6e1f818e0d17437256a035

  • SHA512

    b4c886e3cf612f64933f0bdd05e277546c13e49f646d7b2596031b336028fe7c1f3a8feabbe2a1d4074352e7452a79d137635aeb6691884114409a0600fe9957

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RRA:zCsanOtEvwDpjV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_9bf69b0b615bb6757d84333b821fa3f4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections