General

  • Target

    NEAS.2023-09-05_615e7e30f015990ee5815d85d165ad14_cryptolocker_JC.exe

  • Size

    83KB

  • MD5

    615e7e30f015990ee5815d85d165ad14

  • SHA1

    e11fb84c407e93fc54caffe8b1e52f6806677b36

  • SHA256

    4f7625e376960bdcf6cf80ac90e2695b8e43546d985d9fb2abbc68a9372fd598

  • SHA512

    0454e1c6f1b573f0742aa7d3fa74f24b108eb427b3628a510ecd80c0f6bb2ed377c67734d6243471d5fd45921916c717c94a0f7464352f615203a9f1335b0c29

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cR0:zCsanOtEvwDpjJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-05_615e7e30f015990ee5815d85d165ad14_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections