General

  • Target

    52f5b5ddd82508d43a152181a6174a1a_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    52f5b5ddd82508d43a152181a6174a1a

  • SHA1

    8603f9c68a4c53f31944ef0693439478be141a2d

  • SHA256

    14298212a183a30060d8efe0ff65bbf3cd53d49c307e767f78d825623daca2c1

  • SHA512

    a20b207be58c0f645dd70c1ffac80814ecc9ab8ff3b4fbfda5ac2b19f8bb8e0782268f710ed0d7ddf4c971198d1b55e8bceed9ec6fa089835ae9d4f318c00269

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjLyA:AnBdOOtEvwDpj6zg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 52f5b5ddd82508d43a152181a6174a1a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections