General

  • Target

    40b2a2058006dc7630d56586841d1afc_cryptolocker_JC.exe

  • Size

    88KB

  • MD5

    40b2a2058006dc7630d56586841d1afc

  • SHA1

    8e9a818357640f278e68857810ea034b359526b7

  • SHA256

    47c0799c1c2c71bb865542fb81c49507b9789c670a37320e4e6a119d3b43a0e4

  • SHA512

    c3629501ad7e8767599e6d516442fc40f73359ca144a0f8e153157008101a296a580a6f229029ef9678ed76891bdd2f7700f58d6e3382ae3230fdfbe955aa699

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwN6HtHV:AnBdOOtEvwDpj6z0P

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 40b2a2058006dc7630d56586841d1afc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections