General

  • Target

    5484d36faef27e1bf2ab3f65c1e1fa57_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    5484d36faef27e1bf2ab3f65c1e1fa57

  • SHA1

    ca2b88bd36e490e4d10245ac79bccc289d516de5

  • SHA256

    31e67c23475f0e5a19c081db1023894d9348af14a2ded11ea53ad70649e088a4

  • SHA512

    84bb7f569102ac062126578a248c280868b2f7d5066fbade13666f3ceaf9bda1daf07737106bb6765e4c93122b8a970f138e8adbc7a3e40384716c6c76ad1027

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/TG4dYU:AnBdOOtEvwDpj6zG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5484d36faef27e1bf2ab3f65c1e1fa57_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections