General

  • Target

    2023-08-25_d9dc6a3a3ce1b37492e40707bb9d0d57_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    d9dc6a3a3ce1b37492e40707bb9d0d57

  • SHA1

    9681871ab5af0b060bedd8728cee7a4ee4148c57

  • SHA256

    934b5e36a3be29493023472547a8b43bbc9b12890b03279cdcc00329b00196f2

  • SHA512

    8b79129afe22ea86eba27fab67d1e466e1849d16cb5d7877ab0fe8c26c2a2bd1546380197b06bc4652dca8de067019099ec345d2f8ccea0a2a1233f1e36363b3

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIOzM7G:qkmnpomddpMOtEvwDpjJGYQbN/PKwMgl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-25_d9dc6a3a3ce1b37492e40707bb9d0d57_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86


    Headers

    Sections