General

  • Target

    955ef820b48c3791dfc9c189f79fd244_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    955ef820b48c3791dfc9c189f79fd244

  • SHA1

    d53df04a77e7d2f249e0f245d71def7e83a90ac4

  • SHA256

    c92e8cfb43ca2e952d437fbf76c1f272b90bbca6a9913d455b530eb3e86691cb

  • SHA512

    c924c72b5976136cb0703f860f8cab7e65e4c77d10ccde18e91973b3115c33f5faadb625c22a8f13e6fef3ff8d8e6a2e0097f440e2d5eb3c7d0358471696419c

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699G/TG4dYZ:AnBdOOtEvwDpj6zH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 955ef820b48c3791dfc9c189f79fd244_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections