General

  • Target

    2023-08-27_46b90030e4f5069bfd22cbcf01131377_cryptolocker_JC.exe

  • Size

    65KB

  • MD5

    46b90030e4f5069bfd22cbcf01131377

  • SHA1

    09e3c35dbefa9d08614e9728b4b00599e31294ee

  • SHA256

    7f5a1a46c32e578e34cd2c8ccbf060ebc8e137b63036b26804e467ac10f414aa

  • SHA512

    4c6926ff1513f6a701560bdd42cff4253a90ca38511336f7dc48fafdc0bbcaa0cdccf33b98419959199f9d7b303b4ba34feab53920f2ced66820be7b53936081

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeB6:z6a+CdOOtEvwDpjQ8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_46b90030e4f5069bfd22cbcf01131377_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections