General

  • Target

    49fdbd60f5c45e82f17e61a1041162a3_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    49fdbd60f5c45e82f17e61a1041162a3

  • SHA1

    457ec387b9a335070ad1b893879b2c8f3c515d03

  • SHA256

    a5450f646d75483df86a01bcbe8409550da6dc2f3b282d88588e065aaf1132bc

  • SHA512

    a05a0c90da45a08cf8937433371b2eda15c4b683410429098e0dbb108414a4bbd3c8764fb6148cd90cc0d6595afacca07fb562d35fbf84aa12934343a1e9ef94

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMN:AnBdOOtEvwDpj6z1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 49fdbd60f5c45e82f17e61a1041162a3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections