General

  • Target

    ff41fd5678f4cfb5a373780cacca5748_cryptolocker_JC.exe

  • Size

    96KB

  • MD5

    ff41fd5678f4cfb5a373780cacca5748

  • SHA1

    44cb851a105ade937748e0e83bd5be2c4078fb14

  • SHA256

    7cf1623182f4da4544693cd0b8f44449024a12945e826c727383afbe6d1839d1

  • SHA512

    4a02730329f13fc6e50f6992c8f6cff5a67232c792000161ea339e24358f72f5a0045a39444d3bdf7042bdbf4789683134cbd6145f9768c6eb0202f64cf30ee6

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQb6e:AnBdOOtEvwDpj6zL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • ff41fd5678f4cfb5a373780cacca5748_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections