General

  • Target

    561b50bb184b404eb5328013b0f16a3a_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    561b50bb184b404eb5328013b0f16a3a

  • SHA1

    76789202d2bb1a9605602a8f7c45a4f5aa245583

  • SHA256

    0123f5faca57325c96fafe987e54596e14ba618099a276ed5237c63f4740783c

  • SHA512

    a79605182a2d38b2389d66d8af2be5c0ba3b95989feac6827f489dabffc96ab5dd7d3f22d7226bd777bbb1144fa4a3670c245bb25f67439fe8f004ee7d058b17

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQb6Z:AnBdOOtEvwDpj6zA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 561b50bb184b404eb5328013b0f16a3a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections