General

  • Target

    f6907c3729718cb5cc44b54428704054_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    f6907c3729718cb5cc44b54428704054

  • SHA1

    fe8e051a0b9bd62b6f710ddd96bf661d20b1fc39

  • SHA256

    1d9fc350afe94d2aea63085a7584804746feee0cc681f3dd113eaf2f518b5218

  • SHA512

    6b048b3f5901a5ab10332d3498dfa21087ad14c56dc812a820d699c9ee316600d18bb86d0e093a117b00531b8e808bc8ce9fb405174d977dea466ca73c96aa67

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhnd:AnBdOOtEvwDpj6z8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f6907c3729718cb5cc44b54428704054_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections