General

  • Target

    2023-08-26_c0c19d32a2b80ff54a1c848ef24e8ffb_cryptolocker_JC.exe

  • Size

    113KB

  • MD5

    c0c19d32a2b80ff54a1c848ef24e8ffb

  • SHA1

    e1be56768d7971c0bfd44b632d38e9792da2a854

  • SHA256

    f7e4ef0c7589a217e41bb8d3c230913a2e3cc83434c71c228b2f57e9ef6c00c3

  • SHA512

    c1fd9cb8110c09f9978cfbe47652a414d41c5610bba683ab6970f1fbf57c79fcc09e6472620b1ea7d31404ccf4d461ac9e83d28fabd19dde997c4fef9cd92b5c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/W:T6a+rdOOtEvwDpjLzb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_c0c19d32a2b80ff54a1c848ef24e8ffb_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections