General

  • Target

    71424f032a057a4c4ad51d5c4c3e10f6_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    71424f032a057a4c4ad51d5c4c3e10f6

  • SHA1

    f2e5ec2ec5e0c781b1678b115b1ecb87800add40

  • SHA256

    12a7fe4567ccd43219e1797f71bee731d8a8d49f751376d8d650eb1c4de866c7

  • SHA512

    98486614f09d5800ffc73533cf4c81fcf220062b44eb1cd557a448f308887f6365dc5dca403f5a2c52f7da2b3be690adb1ff1a5928fe5a60bd775ceac7eee9c4

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJj9:AnBdOOtEvwDpj6zi

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 71424f032a057a4c4ad51d5c4c3e10f6_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections