General

  • Target

    2023-08-26_b6d5a55af7bd564553566d6770530688_cryptolocker_JC.exe

  • Size

    114KB

  • MD5

    b6d5a55af7bd564553566d6770530688

  • SHA1

    76650db168b686db34f12e658f8b67ec670bbe4b

  • SHA256

    502b54ee038712bf2d9fc96e5712534d077d20019519c7ec4b0c9e573af5bc12

  • SHA512

    4a42f09635b85320ceb3d56c68a489731cdf9f3333f2880d233c830fee4e3aa36b87fae9a0ac1c7d86ed0bf033d95d0559f070009cdeaf9de8642595c87bb28c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/j:T6a+rdOOtEvwDpjLzu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_b6d5a55af7bd564553566d6770530688_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections