General

  • Target

    2023-08-27_5b1a700479c2ac1fb011a4d435a4f9bd_cryptolocker_JC.exe

  • Size

    124KB

  • MD5

    5b1a700479c2ac1fb011a4d435a4f9bd

  • SHA1

    929726ea99d4aa633518e093cadb0f31c746761a

  • SHA256

    692cff19f1e7c95e5b69f3b935a682860b45cb858f7cefdcbe2ad9f8f52537b9

  • SHA512

    0511aaa3cb797dd33028fc6153ab1a535e5155c782330b095ba13fa87df0a64d2e72820b5c55d1b900533edf76135d5ddd210c6602ba02e9d2a9ce9d4a2a26e7

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eqZ:AnBdOOtEvwDpj6zM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_5b1a700479c2ac1fb011a4d435a4f9bd_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86


    Headers

    Sections