General

  • Target

    336a19c69721848566b4e5dc3bc6aa78_cryptolocker_JC.exe

  • Size

    40KB

  • MD5

    336a19c69721848566b4e5dc3bc6aa78

  • SHA1

    fd7157f50a722f2a53406bcdeb25c19bddd2aaeb

  • SHA256

    3ca07aad0db82ecb6d97e0c5801a7d49520db1ec4decfe1110126cf6bdc082e1

  • SHA512

    fd9854c6eca9b1c22ce6342772ed6d7c07195cb8864103dc946ae6a10d754277d8dab0d1095c2aeb6e51adf13cb564b8ebd9667175511c42b9933417c953b823

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oV:qUmnpomddpMOtEvwDpjjaYaFAh5W

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 336a19c69721848566b4e5dc3bc6aa78_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections