General

  • Target

    165c0d6b39d9dabebfb600f026991f63_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    165c0d6b39d9dabebfb600f026991f63

  • SHA1

    43cfd9ab431b798f0094369cf2e4d859200830d1

  • SHA256

    b24040c119df6e8ec0213c9b289403b6629909db0df22d667fd366398a9ebd55

  • SHA512

    d59a92f52ae020c34eb5dc090548f2e2a4c9297d67b8ab169cd2ab524642c02149e3d3f1977d0d6223b8bc45ca56a8fc5579f6a955bb174ba9c44188a6b024e8

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIb:qkmnpomddpMOtEvwDpjJGYQbN/PKwMb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 165c0d6b39d9dabebfb600f026991f63_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections