General

  • Target

    2023-08-25_fb48a8ff48128e6b749224169a9fd4cc_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    fb48a8ff48128e6b749224169a9fd4cc

  • SHA1

    1a7801476f4865840be5527e3177b8adc02a0a7e

  • SHA256

    a80c7c03064546d67e45baa26b1f95d43ae87a873cf2b98a5a73fcdb1884a069

  • SHA512

    1efffcb9b013ba000309c72ac9be3d3375100577b65bfc9b1fff5148fe638a83262aaac6e1848217cc908180e42eee38eac0de9203312d246ae216db307d43c3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdV:T6a+rdOOtEvwDpjNtj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-25_fb48a8ff48128e6b749224169a9fd4cc_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections