General

  • Target

    NEAS.2023-09-05_7c23041f28fcf23a532de87d7bcefe9f_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    7c23041f28fcf23a532de87d7bcefe9f

  • SHA1

    fc56cb87031e36f6303442577281422346507f83

  • SHA256

    7e274bc1b18c3d37a727cd934340839095109501e849417a43ae1e1e7d1a45c3

  • SHA512

    b2599c840d94969318542118cb62b2d6d54c1decdb38b2cce7455d5c228906b562d791650c6cb696c0fae4aab26ab27699c11e45e81e90aba8c7a0e594e33d10

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAvCbDa6j:z6a+CdOOtEvwDpjQHj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-05_7c23041f28fcf23a532de87d7bcefe9f_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections