General

  • Target

    55c5a8c18da26b5c32b2d4ae4ed2a17f_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    55c5a8c18da26b5c32b2d4ae4ed2a17f

  • SHA1

    e4d109d6bd2c656118b4992f037363acf2f811fa

  • SHA256

    62bdcde5088a8e3f74f5dca41b1ee22c9a3ee41bb35ae1c289837adb56b76f13

  • SHA512

    3e0435a9c1f81b10046a013f22a94c0474372d3f08ee097b3c8cd1cbbcf72d455b77e79a72a5b640bdb0712b2aa98169d3ab3e2b68500fe92b735501d0f1bbdd

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjp:AnBdOOtEvwDpj6zu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 55c5a8c18da26b5c32b2d4ae4ed2a17f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections