General

  • Target

    0f261866acfd99ea6683919c0f827df8_cryptolocker_JC.exe

  • Size

    122KB

  • MD5

    0f261866acfd99ea6683919c0f827df8

  • SHA1

    b1ff5fe11afb8e2a5e93a1f70b12eef7a39276c4

  • SHA256

    22b047103cfc8f45c31340ed8ab4798a0820dcc6fb307a4878c7170396e9eca7

  • SHA512

    3e2564d6988922f40a010d1d332c6fb7ca5c0ec837d18a722e3eb03ad5906792aa4570c9f90d1ee38d15abb8954bb8f201a1b7bbb573caed33bff7fef5cb8439

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eB:AnBdOOtEvwDpj6zL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 0f261866acfd99ea6683919c0f827df8_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections