General

  • Target

    2023-08-27_6b983c4ed822349a7aee4924c71fdb94_cryptolocker_JC.exe

  • Size

    65KB

  • MD5

    6b983c4ed822349a7aee4924c71fdb94

  • SHA1

    f43050e1fd8d6f1eeab32acecf7f39dfba048551

  • SHA256

    09d2adbedca3c2bc8f5d3de2f6b0e1a7101323b23c7f5ec8c57671f85c9b8e60

  • SHA512

    6b169e867eb20eb406596214c5c8235db9af320911ff7d584800d9df0c7182aed952845faa20ef76d5c8b62daacdcec8b3fdb9f47fcd0507c660c74b21d654d6

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBS:z6a+CdOOtEvwDpjQE

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_6b983c4ed822349a7aee4924c71fdb94_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections