General

  • Target

    3b6c113b67123521c886768c1d341dae_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    3b6c113b67123521c886768c1d341dae

  • SHA1

    dadcd679f243647c72fe8505c6a5a439692850f3

  • SHA256

    9dc5110455a88b5b182dc96ba4a6f7af1c1c255afad5476f9c9707f5812d5e96

  • SHA512

    5546c7dadf3127c599fc7fb4c6905bdb8dbc6fc2babe41b0468d1c2581d0afaf2b15a22506909c646211bb3ad5fb36433e592f8450de57e786b8618a9e9e16c2

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjm:AnBdOOtEvwDpj6zx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 3b6c113b67123521c886768c1d341dae_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections