General

  • Target

    4faec9f7c3ed52248f9f7643e0deb773_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    4faec9f7c3ed52248f9f7643e0deb773

  • SHA1

    a4655504800f5044c469595bb93266285ebd2357

  • SHA256

    3c5d50f438a6ddf115c6d4fe34d84b85ef20544e8c2e60592799d6c5d9788586

  • SHA512

    473c3dad411abf6b3784a946d8e322ca726d47c2e32e0cfd67f8e06b2594ac6ac6d49e4e1ac75dcf9d2096f91c4b9f2a8d93e4df0393b1690a8f92e009f8bfc4

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJh4l:AnBdOOtEvwDpj6zb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4faec9f7c3ed52248f9f7643e0deb773_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections