General

  • Target

    2023-08-26_24f52faf8902634a782227cc7c36d231_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    24f52faf8902634a782227cc7c36d231

  • SHA1

    d38cbeb3668d8e78f1053c4ebe562e931df1e91a

  • SHA256

    2767b45c53ba5b1cadde741c0c7b93e9ddaea7b89f1985478765b272574e6482

  • SHA512

    9da7e32c32ce00ac2d27505365268aaebd739f96a435bfefbb395271fbf195c676733fcb91cd9b9b124bd8401357c96b13dafcbfe9a7393116173ce98231a54d

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKt:P8mnK6QFElP6n+gymddpMOtEvwDpjYEg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_24f52faf8902634a782227cc7c36d231_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections