General

  • Target

    2023-08-23_39bb3cba73c93aa83ccd420b0fca1b1d_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    39bb3cba73c93aa83ccd420b0fca1b1d

  • SHA1

    e3b88d5a53d9da78159b2f643185864de50981ba

  • SHA256

    ca30cee8813db96a8d11f1f20b1f18000f9baf447bba0805b017580e2fd8b667

  • SHA512

    9a2ed62c7f7651125dfe3f5e8469a6c50725a12c34389a6eb53589bdafd5e0c2dd93d4a199e34a4a3810f5a480561f6feb56e6373341f168020586f05d27c6b0

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhl:AnBdOOtEvwDpj6z0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-23_39bb3cba73c93aa83ccd420b0fca1b1d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections