General

  • Target

    2023-08-26_c3af1f6ca4a7196b6f155566d01962ac_cryptolocker_JC.exe

  • Size

    78KB

  • MD5

    c3af1f6ca4a7196b6f155566d01962ac

  • SHA1

    804ae3fecae4e5bb0302ba87af9931499b96d4a9

  • SHA256

    c90b84b8063b69712d1d596c305dc6a0dc64fa4084bc633d26128b78cc81fbef

  • SHA512

    f9669b4e8438e38170efa0b4dc4978b89a87edea23bf902845a457a6e9fcb0aab96b592a3c50dd1e978af865bc8c0cb1b567f3e6d0578efc3271e6ac19b9f02b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1D:zCsanOtEvwDpjZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_c3af1f6ca4a7196b6f155566d01962ac_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections