General

  • Target

    NEAS.2023-09-05_a88c4c310cc73af335113082fc15d7dc_cryptolocker_JC.exe

  • Size

    107KB

  • MD5

    a88c4c310cc73af335113082fc15d7dc

  • SHA1

    60859014fe545c2a6b75b2ccbab474b65939f7a2

  • SHA256

    e13f4fca172aa3b74be11dfffdc55ec8ca3676d63b672c2525961875438015a9

  • SHA512

    d9732cf0ec4797e52718f57abd353b07802840f92d9ba79c23a83de2c03b3838672fe62d1966258986ed2b15035935e8b361ba1c864282382ca8c194ffd88e65

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNeIQ:T6a+rdOOtEvwDpjLz6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-05_a88c4c310cc73af335113082fc15d7dc_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections