General

  • Target

    14225d1f99baabe32d380f3a0cdd41ba_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    14225d1f99baabe32d380f3a0cdd41ba

  • SHA1

    0b50505012805918fa45148e546f761fedff8aa4

  • SHA256

    7a215b281656c6934b21b9de8ee4919b9b7e9f0a400fbb2b270a61513c1c3fce

  • SHA512

    fe1321db7007a4ee014ba7abbf63c0be7cc5750d2eaa4f389a91946b6c1d1bcbdf03cd13041143aa66991c3dd4c3d9d9964e0cc92dfb5d61a8635e76b56fb125

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhg:AnBdOOtEvwDpj6zB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 14225d1f99baabe32d380f3a0cdd41ba_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections