General

  • Target

    NEAS.2023-09-07_44b6a2fc42e1c6a3b9913bf7aeb3300c_cryptolocker_JC.exe

  • Size

    52KB

  • MD5

    44b6a2fc42e1c6a3b9913bf7aeb3300c

  • SHA1

    d7f620c13e6dc45852641091ee89e871f7aefa7a

  • SHA256

    5f2ce9ebdf335dc5982848d1b967042f70942ca1d8966bb014fb3f7703134fa3

  • SHA512

    cd733fd0289b390aa2d4c330a0bb5174c532709f45696e0d08076ddaffb2d46ab07cde15c5cdb1088c853b4ba07d580572fd22996715e8bc0296d35fa4ed7d85

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpz:zj+soPSMOtEvwDpj4yn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-07_44b6a2fc42e1c6a3b9913bf7aeb3300c_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections