General

  • Target

    5264baff50cd3698fb9d1109af282b96_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    5264baff50cd3698fb9d1109af282b96

  • SHA1

    c722c21d5b975ab893b4b79a8181819e73af0ae8

  • SHA256

    73250903b25e2bb1393dcf241e7432b24a02d20bd0d7df2367b3977971a1f9ae

  • SHA512

    b671c450133f4197fe78cb6f5a4ae589e8d17ddabed8c9623ec927a32ce4c7ee09026e57ba3efbe954f925fb7229fff7cf0c12babf2338030493d56fbb9869d1

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMZ:AnBdOOtEvwDpj6zx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5264baff50cd3698fb9d1109af282b96_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections