General

  • Target

    2023-08-27_1096c65985cad0265c68be9a60fdbff6_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    1096c65985cad0265c68be9a60fdbff6

  • SHA1

    fe5522bfc4361bf8224e999a328937d9cbdf190b

  • SHA256

    ff07ced33848e4d5e2d910759b95a179217c5baeba0002694797e7c5560bbb63

  • SHA512

    8900902c1af8ceececb7fb40ee69ee59ba7308313bae90995cbb1dc1bb8d45ad56be37de8c8960e065bd0773a0589cbd078a032e9dfa58e47c9a0164e52cb30e

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal5:1nK6a+qdOOtEvwDpjY

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_1096c65985cad0265c68be9a60fdbff6_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections