General

  • Target

    2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe

  • Size

    67KB

  • MD5

    665f8175a73d7bb1a4ec523fe0f33982

  • SHA1

    405e6502be531a0e81b7d463e3a467aaace102b3

  • SHA256

    0a54e20eec22278515036fdc4f3d95b60f13730d47d4340dcca137af87a42b60

  • SHA512

    f08e3e17e6f4c82145763a3406fc274d6c650c8f109549506227568c9361d434772d3651a561d359cb828eacaa6a9abf7fe5ba8fb4fb0b836d8156986cb79d5a

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal+:1nK6a+qdOOtEvwDpjz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_665f8175a73d7bb1a4ec523fe0f33982_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections