General

  • Target

    NEAS.2023-09-08_027ed0caf3cb8f1849e6d7c04ebd77fa_cryptolocker_JC.exe

  • Size

    91KB

  • MD5

    027ed0caf3cb8f1849e6d7c04ebd77fa

  • SHA1

    78a575f0bbc2868a66fec8de15c558c9d786df24

  • SHA256

    b0be6274edaa8a448765a54d71f0169c05a5639717f8704d6e97145126711149

  • SHA512

    719121b1ba8366ed22747a05b7129aaf87755ff3c0c1ea08dee997f73d45a52a8f2b6e078e581db7a962983b33e8c7379d3abdbab81bb5a1652087091391083c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9i4RRN:zCsanOtEvwDpj4

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • NEAS.2023-09-08_027ed0caf3cb8f1849e6d7c04ebd77fa_cryptolocker_JC.exe
    .exe windows:5 windows x86


    Headers

    Sections