General

  • Target

    2023-08-27_6bba35a59c5ee7f2ea464fe8740d06fb_cryptolocker_JC.exe

  • Size

    66KB

  • MD5

    6bba35a59c5ee7f2ea464fe8740d06fb

  • SHA1

    7d98a1aa9527486bf06692038902e5b56160bd16

  • SHA256

    5a17981f8b56204b72c3da5c767c9961d9e08b800b8c55409b6c69ed51e7a79f

  • SHA512

    22322764101c4f4c3ebbe216b600da2987c4dc4ac76e62d1c485a855a150b7becd53c3af7909946a277939b78711165266f395fc7b49453c0ef7a7a67b3347ca

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal5u:1nK6a+qdOOtEvwDpjV

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-27_6bba35a59c5ee7f2ea464fe8740d06fb_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections