General

  • Target

    46f3baec494e4241644628694b241220_cryptolocker_JC.exe

  • Size

    41KB

  • MD5

    46f3baec494e4241644628694b241220

  • SHA1

    af962c399463d0038e54844eb72845e7824c0405

  • SHA256

    c79750272adfc19d29f965a17ea9a3919fc61d1010cc4abe38e08834b9d2de12

  • SHA512

    c3122e2771c5d9a57d72da48209fabc686c15009e094fbca7b86c1e68ba1130b00ae9ad20b19e8efce6bf83057f583280a731cde0dd7ffbf82433c39824e953a

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5oy:qUmnpomddpMOtEvwDpjjaYaFAh5h

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 46f3baec494e4241644628694b241220_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections