General

  • Target

    5a6df7f0c35b8dc263f92b06c45b8502_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    5a6df7f0c35b8dc263f92b06c45b8502

  • SHA1

    564ff3b29c463dd1d7ab5f5973b3b7f4e8e2a1d5

  • SHA256

    244c3f963f259766b6ac96e0c5fd7fc0d6c7f271d2d2521adebf4c41e24837f1

  • SHA512

    79cd0093ec9d9a6fc5275d332b98fbbad2e0f77df8ec4878ea31dd7866895680287b3a7fd6a63418dcdea9d2096016dc67e552ab5740066cf79eea5f6ee2150e

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/TG4dYE:AnBdOOtEvwDpj6zm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a6df7f0c35b8dc263f92b06c45b8502_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections