General

  • Target

    NEAS.2023-09-06_8a65b2ed63790617656f214efd9e2e99_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    8a65b2ed63790617656f214efd9e2e99

  • SHA1

    6d6ff4115597715d802ba4416fad855bc433b23f

  • SHA256

    6e7ad5d2de7c68c3c216a423d6ed90d013e27e7c1f85da5337b6d95f10dfeb93

  • SHA512

    04a35cbf46580250bbeb2d7a10e3526fda501f8c5622e351b5f4d3372e670841cb1da9b9f7d7ed040ddfb74a6bf9a64abd4749763445974e094f7c4d80a26c3b

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjg:zCsanOtEvwDpjd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-06_8a65b2ed63790617656f214efd9e2e99_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections