General

  • Target

    2023-08-26_4478680d59f53dd94e2fb195e84f2408_cryptolocker_JC.exe

  • Size

    63KB

  • MD5

    4478680d59f53dd94e2fb195e84f2408

  • SHA1

    23fbb4d2df30d2ad78b13b61594c646703a6f320

  • SHA256

    70efc3d44e52882b3fbbffab572281e903e7f13af9adb11eba6b1fcacd263ef8

  • SHA512

    06a44c166390cffbe14721609d3a1f1f48201238566f11a026a0128c745f58fbaf81529fda44a71c4c9ee4db135cb300323e5d180fa808f653e19f8dcff5418c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojSb:1nK6a+qdOOtEvwDpj5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_4478680d59f53dd94e2fb195e84f2408_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections