General

  • Target

    2023-08-23_664dc40d1646bba83b03456c060d507b_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    664dc40d1646bba83b03456c060d507b

  • SHA1

    d0e1f119dae101abfe6263294cd6fea3a5588e29

  • SHA256

    f06b0072b2f9cadc8f75dfbd5fd983cf347891756e1e0dcddf785de15d6f1d3f

  • SHA512

    a1f92ce232ca989fc001ac24c40341062246a9963f1d5308eb2c8e946a02f3fa946554861c3e5013d527bc20b8462c616d047660d2d05f7890984375e9b1db05

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIOzM7c:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-23_664dc40d1646bba83b03456c060d507b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections