General

  • Target

    2023-08-25_5d5fa54bd03202171110875bd26dded6_cryptolocker_JC.exe

  • Size

    73KB

  • MD5

    5d5fa54bd03202171110875bd26dded6

  • SHA1

    679a49115d0b90cd510f54a63968931aa4c0caf1

  • SHA256

    27533d62a5ddc1bad0fb2fb1b5f24f2294c2704e20575dda0bab3f7611c6e6c0

  • SHA512

    2fe0660e9933110815003e983bc9c3c3f7331da74a5dd302948359e17b2e03141d55a3e232155bcb060bb1d766bb34f54239e39d8cd32d81a13c119d212ed620

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7pBlqrr1HBJooSeKzu1adyBf:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-08-25_5d5fa54bd03202171110875bd26dded6_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections