General

  • Target

    2023-08-27_400c70f6f43ee1d3b51275f191f3fe66_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    400c70f6f43ee1d3b51275f191f3fe66

  • SHA1

    25afe47b3537ea8a039370aeeae6956724344b09

  • SHA256

    0bc556f25d722bcf6fb0776bad940ad8c4c0b633e22670db0fe054b0b92de520

  • SHA512

    5789fdee4e3eb50b8daa80b9a2af7e49aa887f0dcb9a66ab565564db6e0cf987d7154fed8c9138afb6a136a1f10821949a2960d296eb058d1de27d2586327c1c

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jK6:P8mnK6QFElP6n+gymddpMOtEvwDpjYI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_400c70f6f43ee1d3b51275f191f3fe66_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections