General

  • Target

    2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe

  • Size

    39KB

  • MD5

    2782a9c58b9e6a6154fd68d2749b08dd

  • SHA1

    c037f663e67c8b7afe68f1db4fed47173154ae42

  • SHA256

    a54c7881fb9dc538f52eed7f7ba52ca30261ff7b78774372c89d36eb2d2a3032

  • SHA512

    f243a844c51dfb02782377cc9bf654994700851b6e0a800804038bb587aa21c664ca5a7728f034c47481df284f00913d57c6a8eeccc776f9c371face3c4f40c6

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOX:qUmnpomddpMOtEvwDpjjaYaFAH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2782a9c58b9e6a6154fd68d2749b08dd_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections