General

  • Target

    2023-08-26_1e6921d6f94d85c3ab3726ea49031a14_cryptolocker_JC.exe

  • Size

    63KB

  • MD5

    1e6921d6f94d85c3ab3726ea49031a14

  • SHA1

    039a320b767650e8526d0c9bb3ee94b3e2199317

  • SHA256

    533272f87609e31e2cf790e7357f09d508609ed9ebdf2fcf93847f42d7d65608

  • SHA512

    4b7b3273790136bf832096e92b46c32b50b0e7e14536085118b5447b55e472e1158083de70f332f4f607413873e00d05f49458c1bc79f853a144c2c80bb881f2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUXojS7:1nK6a+qdOOtEvwDpjJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-26_1e6921d6f94d85c3ab3726ea49031a14_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections