General

  • Target

    2023-08-27_55f6c3c1350ae275cb78f60d56bdd9fa_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    55f6c3c1350ae275cb78f60d56bdd9fa

  • SHA1

    21ebdfb326d14b3eb250fabe8a2980773b38a40a

  • SHA256

    b3716828956703be79155c94a8f739eb454793b415514e6981c83cfaa36a16cf

  • SHA512

    bed25a3e460dce11a46d98a2980e2fc8cc2ed56803ce2e8a235912ec87a51dd619ed4539e4d7db7f883bdc68621dfbe908960a9671ddf880e2955d56f071408f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal/:1nK6a+qdOOtEvwDpji

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_55f6c3c1350ae275cb78f60d56bdd9fa_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections