General

  • Target

    937b0bceeca5e50e1866c0d52ea6f476_cryptolocker_JC.exe

  • Size

    116KB

  • MD5

    937b0bceeca5e50e1866c0d52ea6f476

  • SHA1

    5129e5cbcd4c59c2a56e0bcd68cdc8ee4d939878

  • SHA256

    ceec8230e5e4acac96d2a20161a29477930c668cce6613fa5652f815a5f38c9f

  • SHA512

    a600bf6d35c1984875fd6cbd0ee449a89760e0c0772e8b8ccacfe0119cfdb68c905af689ed111333c2351c4ccb089de3e74c007cf0b274363f044788aa59c5c6

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eT:AnBdOOtEvwDpj6zJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 937b0bceeca5e50e1866c0d52ea6f476_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections