General

  • Target

    389cb8e70a6128640059c03b2ac1689c_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    389cb8e70a6128640059c03b2ac1689c

  • SHA1

    a5c695a6d3a49472a6f1d935cfd578db5ae87c75

  • SHA256

    17f3c9131d929c7e14486b2b22340aea93488563cf30c291b7c8427d36cff695

  • SHA512

    e5433465df24f513a9b93eabcb957a62624b5018a7f09a4ea5a1e07051e5090e00b4c511b7650fd97e30ad83201001de4a1c0a0ee1d1e25b5878b25080171fbc

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjM6:AnBdOOtEvwDpj6zy

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 389cb8e70a6128640059c03b2ac1689c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections