General

  • Target

    5ab1255157bed62c3b9319a5fc0a3371_cryptolocker_JC.exe

  • Size

    39KB

  • MD5

    5ab1255157bed62c3b9319a5fc0a3371

  • SHA1

    0909b2bc6abf5c350dca0696386ccabe89b2d415

  • SHA256

    1d50a3a5266d7ff150ad306e9ead4a7c0ad7b81af5f15fe16af92d0904864479

  • SHA512

    9772762e3f2aa8914c3799862be2bc01390cfa35fa3d4988edbb09950ea9c53da130a1eb14b52fb3e2f2c23f64ebd4dbe7f92059cb361687ece64b60d98d7bfb

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOM+Q:qUmnpomddpMOtEvwDpjjaYaFAvQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5ab1255157bed62c3b9319a5fc0a3371_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections