General

  • Target

    2023-08-25_c0c86a8f75034d791543b4481ce05ab8_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    c0c86a8f75034d791543b4481ce05ab8

  • SHA1

    5efcf948a676218a5c59b71d20218eec02a1b753

  • SHA256

    dc9cddfac8008d024e9992bc70a095c4b107dc337b93109acdea0267b80fe0c2

  • SHA512

    491e4be81b90b81dce51bf15e7ae4f26be8f949a20846f5b71a86e1226d0efa130605d55fd1b259ce99e655e33543a2425ab1fed6cdb37d9a577cadeb48496c0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdW:T6a+rdOOtEvwDpjNts

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-25_c0c86a8f75034d791543b4481ce05ab8_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections