General

  • Target

    2023-08-22_ac7df616958b557cdfc5241cf03665c9_cryptolocker_JC.exe

  • Size

    106KB

  • MD5

    ac7df616958b557cdfc5241cf03665c9

  • SHA1

    40c0281feccc9b7beb44f129b660db3a55d21ae3

  • SHA256

    6443a5eb53a6dc2789e2d62b765c6d594aa38b73bafca4e50459c1306e094a2b

  • SHA512

    959088ce407b34c47d7262713f6de27bb92d07da312e09a473e67a4e2c3463cfd34ad8bae564f0dc127493f61085a92cda1fbee9a1c6b3b9dafa2cef806d6100

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeIo:T6a+rdOOtEvwDpjLzC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_ac7df616958b557cdfc5241cf03665c9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections