General

  • Target

    4ffe9f1e2f2dbcaaeab30c8289810698_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    4ffe9f1e2f2dbcaaeab30c8289810698

  • SHA1

    68a093d983e9aa17496ed8de2a6153859d8acc65

  • SHA256

    3217e98b8555f6e24db2e8381ebf7b0245d16601733d1955f31d13b7840bb647

  • SHA512

    63ccf9d41159df3ebcd28baecbc52b725aaa8bb249160fc219018d88e707b9f8ff90b3d6cf648bc874e18e84b5d9ce8cee2c4a63213c4cb8061e493f293289f9

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJh5:AnBdOOtEvwDpj6zw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4ffe9f1e2f2dbcaaeab30c8289810698_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections