General

  • Target

    2023-08-26_6dc80981d2944cf00b2e588b86133ac0_cryptolocker_JC.exe

  • Size

    120KB

  • MD5

    6dc80981d2944cf00b2e588b86133ac0

  • SHA1

    6467d4b002b0de9a3c216b84c9ada48bea892a9c

  • SHA256

    22a059251402f95014cbeb2320f023cfc22d5d5edcee2d5792822488f90d5fb6

  • SHA512

    b85f3fd9dc9dd4f0cb8c67cec42ed084e0eed0edc966216092a8fa7723fe41574685903bb534b858788412c9033d8128682794475fd4f44c14c3c507c2623548

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgpQbCJh1w2:T6a+rdOOtEvwDpjLzK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_6dc80981d2944cf00b2e588b86133ac0_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections