General

  • Target

    2023-08-26_255e3ed85be7d9f1faf2302d63d05e9e_cryptolocker_JC.exe

  • Size

    85KB

  • MD5

    255e3ed85be7d9f1faf2302d63d05e9e

  • SHA1

    4eb90d7419368dc0335d3c3c75fdc9ac28d907c6

  • SHA256

    5cb89d01638214f3ed7fa63f5e5442e2347df32d695bd40099b60a317c35b8e1

  • SHA512

    feb36b78f96b619a4ffe90606f4c56fb92550ea8156429aa79db8ae85a82015b050a77f9e2a77b54b40fe1315e08d71d67f0864830e7c38c94919707aef8648e

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDji:zCsanOtEvwDpjr

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_255e3ed85be7d9f1faf2302d63d05e9e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections