General

  • Target

    2023-08-27_662be62ff88b5ef000b0b1a86ea3b7f9_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    662be62ff88b5ef000b0b1a86ea3b7f9

  • SHA1

    0bed881b7d00659e50afa8387dc385e045b100e0

  • SHA256

    8a565a20ea8f51d3c4df610b52ca24300105ba10e3204a43648a5293e6e8e1b4

  • SHA512

    f8a82b225036791c571fcff85302570995564453f8d6f3d648731674c7ae862916522d68944d9decc9f3810f8f69e6b8f4769967f68e70dcb4831e2d9681c740

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIP:qkmnpomddpMOtEvwDpjJGYQbN/PKwMP

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_662be62ff88b5ef000b0b1a86ea3b7f9_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86


    Headers

    Sections