General

  • Target

    f6a945984f3de49d541e42a7226e9c14_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    f6a945984f3de49d541e42a7226e9c14

  • SHA1

    f028d95b84212550e39b3ef5d18c1404524d5455

  • SHA256

    b1eacb17515a6203d22249238397ff7a14722f38a0bd484c9e8e93e2027dda2f

  • SHA512

    fc15ddfc068a1f0be6212afadd9123428dd337bc9b7037406d9ca41c55eb47b41c3151b25d99ffe7643d2d611d977f3c5c12215cff6c07916aac3a1cdeeb6941

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhh:AnBdOOtEvwDpj6zY

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f6a945984f3de49d541e42a7226e9c14_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections