General

  • Target

    9422b22dd71f3e38b994edf0cb9890fe_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    9422b22dd71f3e38b994edf0cb9890fe

  • SHA1

    52deb92d715dcd8605ae984ced3f125cbb74ffdb

  • SHA256

    9de64f41a647bdfb0352ed45d214eb2b5aac77fcac353d9b22d6d7a15d36e3e2

  • SHA512

    ae761babc22db5fff5a676c6e33713f42ca4686766d36dc055707eb573ce3b324687fb38d41318e85a6e82e25457a523ef3eed8cb9ec6caa62f37e79f1194565

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjM2:AnBdOOtEvwDpj6ze

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9422b22dd71f3e38b994edf0cb9890fe_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections