General

  • Target

    2023-08-26_3c18c8e0fdc0e30d84d56840120b1e43_cryptolocker_JC.exe

  • Size

    78KB

  • MD5

    3c18c8e0fdc0e30d84d56840120b1e43

  • SHA1

    fa6836ec3f7f593df3a3ee82a8ec5b45e79d1c2b

  • SHA256

    fcfe626dfab03accdd043f89f18e8c764baf8fd17cee0cc13a24a53177900415

  • SHA512

    c181c8475317e6cf70848f2b1266443aa92a1de13192bcd56c4ffd536a01bea85d76776c424fd918fcb519af4d4e92703fa45dd5b0f2373583b6c00e25ce8db2

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS14:zCsanOtEvwDpje

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_3c18c8e0fdc0e30d84d56840120b1e43_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections