General

  • Target

    NEAS.2023-09-05_49b209327507e9dc96c8a9f889fbf57b_cryptolocker_JC.exe

  • Size

    83KB

  • MD5

    49b209327507e9dc96c8a9f889fbf57b

  • SHA1

    5647b5b1892f161c5c811a0ca8d600b40d27c728

  • SHA256

    e3cb4e964836700ce65f8a05267d58f6326ae02d7935ef999ad13496f18532ef

  • SHA512

    59ac3957e367b7b2c18d6a781c71936593daff5392481f84bf1c294fe47e9ea1c62be142eea3a71a5d7974b5dfcf31768b81fa010b328a1cc4374b2eda0a8d60

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRU:zCsanOtEvwDpjp

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-05_49b209327507e9dc96c8a9f889fbf57b_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections