General

  • Target

    2023-08-23_5055039418d533296041cc6d10034b11_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    5055039418d533296041cc6d10034b11

  • SHA1

    97eadc859e4454fdc229ba8b336b0af834bba3eb

  • SHA256

    902e7b939dc6747227c7954eeec0cbc8390bf457997d91953f8e93806570d914

  • SHA512

    a5c21b44535ffe26137232d28a1b91359cfabb2360ed3c438d71ce283fa532e55050454cbb577af38da34cad1e66064939b09ac47d106e9229649f0b4139d9f1

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalc:1nK6a+qdOOtEvwDpj9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-23_5055039418d533296041cc6d10034b11_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections