General

  • Target

    5485a3331046781245fbd11c9587bb36_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    5485a3331046781245fbd11c9587bb36

  • SHA1

    764e75217ae338539ecab4c5845d969bd8ff4fec

  • SHA256

    cc0ec4accecb9b880b65f4497182d2d65716bc15eeec4237dc44ccba288e12ca

  • SHA512

    5241bc43dff12ae7748ac782a7a401df295557cd5ec23be66855280c6cabfb3f87db1db75a8444db305c257f40e6e1e5792d97cb7e161bb45a8dca479e18eafc

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhu:AnBdOOtEvwDpj6z7

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5485a3331046781245fbd11c9587bb36_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections