General

  • Target

    0c269d9cd58bf11caf9040e82a6221fc_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    0c269d9cd58bf11caf9040e82a6221fc

  • SHA1

    20fdd35742b623d958ebf124e6b397d6c6dbf833

  • SHA256

    3bf85646e43fafe0ccda54115b3966220243aa19db5b57661ec2257aad243d75

  • SHA512

    e882e7de637101ccdf421171afae5e407527f0bbab3b9766d1e19e1052b9e3f6cdf1c95b051de8a0edf44ca9fffa8fcfdd921e62a3f683bcde91835ac5567999

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJh4:AnBdOOtEvwDpj6zZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0c269d9cd58bf11caf9040e82a6221fc_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections