General

  • Target

    66e32a24d1ab16eb6db041015c0f21a8_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    66e32a24d1ab16eb6db041015c0f21a8

  • SHA1

    aad9f843c99a5d341ee7946dd1029b6e510976a9

  • SHA256

    3ac0b2e138d2665c1528478f814b2450d229ebee381f90c241745ed9908541b9

  • SHA512

    5d75fa471e9ed0a97549511642cd0c3812634b0b9acfdb15a00cead465a3104dc535b40391e71c79669c61389f2342d2b0bfd72793eb3d60f91cc8470cb1aa74

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQb6F:AnBdOOtEvwDpj6zM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 66e32a24d1ab16eb6db041015c0f21a8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections