General

  • Target

    2023-08-27_2fd5cf619c2b44da47ea2d546ad2a471_cryptolocker_JC.exe

  • Size

    74KB

  • MD5

    2fd5cf619c2b44da47ea2d546ad2a471

  • SHA1

    b42d2092c31843bb66aa5c02e5f3818a56744f8c

  • SHA256

    6c9fc403f6fd3be25be8f009d166b0e4134e9a31ac21afe4913a8cc6e7053ca7

  • SHA512

    282ec5e229ad5fb1b6beef8081d17ac6cc9f29894b7c09fd2532cb0cf30406bb330ca70c706f161b80412e96c09ed5f36b165d9632b4cb3af306460515b0adc2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSm:T6a+rdOOtEvwDpjNM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_2fd5cf619c2b44da47ea2d546ad2a471_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections