General

  • Target

    133c6521f845cb71a35d4220e9f77b52_cryptolocker_JC.exe

  • Size

    91KB

  • MD5

    133c6521f845cb71a35d4220e9f77b52

  • SHA1

    6bf036f84b5e2a9cf6589c9a686e050952038d34

  • SHA256

    ff8873c5bf7434f5fd7ad3314d18e79a807fe94791a50a95ac0fef397ce12136

  • SHA512

    be921b5c514905cdc17a3022afb41cf2b64a0e20756c26bb6cff90d9bdb8557fc3e88c6aac52a59a577e6a0bdc0a0aaa8f81038fb97d54dced51247eeaa97040

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp+ofA:AnBdOOtEvwDpj6zl

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 133c6521f845cb71a35d4220e9f77b52_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections