General

  • Target

    2023-08-22_ad44f443f64a06c8c6336d59ef9d12e9_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    ad44f443f64a06c8c6336d59ef9d12e9

  • SHA1

    eb187f5d39c47dac4375610d2d92be9137c07c5e

  • SHA256

    a20976535844ca1c62cf87b4be4ce5c81dd877fb851a2411bf16b7fc09a185e3

  • SHA512

    d5a02622491ec95b5538d04e2622c0d03cf8be84aa66c7478a5e050d642e28747858e6e712ea811425aca71bf37d59cabf6e7f49a5ecfdc75b39c01e670249c7

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsvikF3:AnBdOOtEvwDpj6zk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_ad44f443f64a06c8c6336d59ef9d12e9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections