General

  • Target

    58aead0a704014180d0b297c674d7bb8_cryptolocker_JC.exe

  • Size

    40KB

  • MD5

    58aead0a704014180d0b297c674d7bb8

  • SHA1

    f270241333230249814c485e29a3580a3a8d99b4

  • SHA256

    77173e224cdfd98b953ec403e1384c25095dc4d2a0674fff1a6b2d3619c0ef3c

  • SHA512

    d33ca22c089e31bb8d4714d47c4974f28a7f550fd86b747a98a2376a0d94ed67789fbd9e261876ea3c49a1d194918b4ef50c6fb607ca4d1f3501907952e9dd6f

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzfm5o6:qUmnpomddpMOtEvwDpjjaYaFAh5R

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 58aead0a704014180d0b297c674d7bb8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections