General

  • Target

    660a51f24f42a78b1992c55a0e90f288_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    660a51f24f42a78b1992c55a0e90f288

  • SHA1

    0fb7fb888b406f2100234ba902c8e5aae63947b0

  • SHA256

    efa3cf78c60d39b8fc6ad236df3dd5f679aac1ecb140256ff2111583c0e12742

  • SHA512

    e4740d38ea18f4b45f2fe18465cce12928d46500fa5b7cc0bf13c2a368c2e82dfbf243ec3ea8f9ff9451cfe9f4880ecf5b6136c62d769bd605edf1ab8dc957ba

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjQ:AnBdOOtEvwDpj6zz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 660a51f24f42a78b1992c55a0e90f288_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections