General

  • Target

    6a91941634617088f0e40f3f15bf40bb_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    6a91941634617088f0e40f3f15bf40bb

  • SHA1

    7a8be34a8c8c3b9c5510ab00100bcb5d0b8965f0

  • SHA256

    5a53a2653d03fd73a4561a64617aa1c35bda3f25424ef2be5f6abcb06bd07142

  • SHA512

    cb854bc204d8fb3e34ad9576fa50972cf94e301256491e08d02d689e6a17dfa582056eb328d054ce5977b32d47abc44681597d1e6432cb3c5f2bd2a2c343941e

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQb6W:AnBdOOtEvwDpj6zz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6a91941634617088f0e40f3f15bf40bb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections