General

  • Target

    a168515f0558c2046a34a03858d4237b_cryptolocker_JC.exe

  • Size

    117KB

  • MD5

    a168515f0558c2046a34a03858d4237b

  • SHA1

    2fc3d8d87c97789d61651aa5a74cb5f0cde33af7

  • SHA256

    9fd8c1c29a09c491437ffa8a19330f0a0daf3325f7b3f7ed7d5c12bf0c6cc392

  • SHA512

    cee70dd6c634d9d0006368e138fae51dace890de4f4f6fae6f610b55335b24030a5e4c523f974405c99c1708110da14387c0e89c2d389206c7d0d84b41b738b6

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eQ:AnBdOOtEvwDpj6zG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • a168515f0558c2046a34a03858d4237b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections