General

  • Target

    49bcb0b66f700cad28bcc7a1c9ad6df9_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    49bcb0b66f700cad28bcc7a1c9ad6df9

  • SHA1

    10c191f385d97b6a19894302bb83c998a35c20db

  • SHA256

    7a116d72e74bbde4801ef840acd0c0ce02e0e08d8010cb189b24518b6df2c2c2

  • SHA512

    cba19d8e6e54da51bfcbc7716b605d58555ff04d7796bc9468295ed240f91e2c950c4606fb77e384b343d156f23e897c69445d9c5ceaeaa95426756d0b7a5aee

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMcd:AnBdOOtEvwDpj6zU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 49bcb0b66f700cad28bcc7a1c9ad6df9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections