General

  • Target

    2023-08-27_4fe9cde4387d824733766eb5bc82512b_cryptolocker_JC.exe

  • Size

    65KB

  • MD5

    4fe9cde4387d824733766eb5bc82512b

  • SHA1

    ef1efcc9d39b8dfa6cd73da81465ac8fe9d6a6a3

  • SHA256

    daecd2660860af4484fb0c4e73381015f0672c1ae71a952fc77663a38c8ace00

  • SHA512

    dd179a2d31fcdef956efad97c79f285de4aafc5e6cef91c80f7f266d7d6d43f99028278e0c65cc7b18e63aa37dedad7ef8d18d02c79b66e7d34f68a04f4bf083

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXr:T6a+rdOOtEvwDpjNu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_4fe9cde4387d824733766eb5bc82512b_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections