General

  • Target

    2023-08-26_59b708b14d38b884996d1e98ea834671_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    59b708b14d38b884996d1e98ea834671

  • SHA1

    e26a0c80e25a88d086d930e4324fb1180562ef5d

  • SHA256

    57068c4655779a5b8c68a11456459a05f9a0e582c3bec1ec4038bed088dcbb5a

  • SHA512

    13e77e04c99d808a8b315194007d04ec73ee0198df394a951566f028285c51c52efffbef0d9d5c3baa4caaa7e7228958a8fe3050e0b41b2eb9d041a427917fef

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKvWxHCbSVaFn0jKu:P8mnK6QFElP6n+gymddpMOtEvwDpjYEX

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_59b708b14d38b884996d1e98ea834671_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections