General

  • Target

    04a2bcb2f01682b52380148539c99960_cryptolocker_JC.exe

  • Size

    32KB

  • MD5

    04a2bcb2f01682b52380148539c99960

  • SHA1

    e111dc50f8e9d9dde6f082a04ecc6a88f969bf67

  • SHA256

    f4986ea41ef90034fa6c996a68d9ad46cf1125088da31f233a14c3a1d68ac09b

  • SHA512

    090e8eb40c3c3ec463f2fe4a8e2746d1c9e0a520dbaa96aa695aa1f406e3f13dbe68c66a30b327e1d3344c37effc90f7e912e84f5c5156717952cbc076aeebb7

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLa7Z:qUmnpomddpMOtEvwDpjjaN

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 04a2bcb2f01682b52380148539c99960_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections