General

  • Target

    2023-08-27_3455b39e5d0089d88229cf48fb1575d9_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    3455b39e5d0089d88229cf48fb1575d9

  • SHA1

    11164784dc4ffa0cc2c901a4b8c6551d0c900316

  • SHA256

    fbcb25290e1c001e7cf16d6579c16e95ab5653d026277aadfa403c5281e4abf8

  • SHA512

    9b6f05451e29bac6681585223a0bd7c5c6b4e4075da937be677f9f3d85944fb4c4d599d9c04930fbccb2bf887edb4133d400651e138da74297023f212033372a

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoI8:qkmnpomddpMOtEvwDpjJGYQbN/PKwM8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_3455b39e5d0089d88229cf48fb1575d9_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86


    Headers

    Sections