General

  • Target

    2023-08-22_bcd6857a66ff96e8a662a1ea67db1681_cryptolocker_JC.exe

  • Size

    106KB

  • MD5

    bcd6857a66ff96e8a662a1ea67db1681

  • SHA1

    3e5a36c15c7e267db5fcccc5b788ad895f34117c

  • SHA256

    ce34039d0355e32f426adcd8ba47e3bb034f46024e347895112acdee3ec41608

  • SHA512

    ab9a94ca578ab996106902a75f2327d17745caf48f32114151ce00d945b321b6a871fd1c3fef74ff1637c6f2918444d85591b9a3426a4cebf784e85ae64b206d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeIs:T6a+rdOOtEvwDpjLze

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-22_bcd6857a66ff96e8a662a1ea67db1681_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections