General

  • Target

    1a4e18f0af81f66fcef9980175c4c4e3_cryptolocker_JC.exe

  • Size

    41KB

  • MD5

    1a4e18f0af81f66fcef9980175c4c4e3

  • SHA1

    d61654a74feeeb87671e9ce1fbed77f5e06579e2

  • SHA256

    c6a5192f1e11b6c18e52818d17d530dd3e8f953f4802a9028c373a42d971816b

  • SHA512

    4d2f222f43617bb6ea02097f1060f18fc8fb4cb2bfcdd70ecc9cd1e376e49752646e83183b106b4fed4be8b9d638aacb2f97e847305fb76100094abd46bc0a83

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOQjCvM:qUmnpomddpMOtEvwDpjjaYaFAe9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 1a4e18f0af81f66fcef9980175c4c4e3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections