General

  • Target

    38d610fd2c197374b01c1f7dbe29968c_cryptolocker_JC.exe

  • Size

    40KB

  • MD5

    38d610fd2c197374b01c1f7dbe29968c

  • SHA1

    26c00b595700afdf459f04fb02c07b51c58a82b1

  • SHA256

    7970734bddfe6153a5c7adc9916a3d4ad815b151f3ecd09797f0e21a9c47d91c

  • SHA512

    1afc76ae9dd0ee68a2457c9580983df9ba4ef1191c4b8de8e87e17597f889b805031c3330f2d33e52b2c84dcb48f80ffa2688f7f3118aa3fbce38bd3519432eb

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oX:qUmnpomddpMOtEvwDpjjaYaFAh5Q

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 38d610fd2c197374b01c1f7dbe29968c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections