General

  • Target

    9955133ae24632c9c5d62552a8dd66d8_cryptolocker_JC.exe

  • Size

    116KB

  • MD5

    9955133ae24632c9c5d62552a8dd66d8

  • SHA1

    a3e84621cd3b3b173c12577630444390eec3c322

  • SHA256

    bcd7216d631d90c13794c9d9bdc6bb4aed7cbea083d099ed845d01bd4e27a9f9

  • SHA512

    af94bdc8fc7228a0a9def3aa74333b9f8c8b4330cf5b63d07a9c9d4225608cbf4c01a0edbd937003c84bf284bd9b34c435bc23e3930483ec72cb144dd0298670

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1m:AnBdOOtEvwDpj6z1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9955133ae24632c9c5d62552a8dd66d8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections