General

  • Target

    1ab028040db32cc71f669e214a927e07_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    1ab028040db32cc71f669e214a927e07

  • SHA1

    0adfa4943fd67b109c403d5ccfe2cc2a73b1cbf3

  • SHA256

    77aa23c332e91236283b01e54ed1338e619afa2f25e39c0f7a686d4c446f6af5

  • SHA512

    5c5df8be861378dbc3942ab8df8aaf37cd66e318e8dc60d93f3f7ec295248a22fafda1854ba841e58e875b052bb3583cbc2a1ef41a10587c0087a01e8e38b468

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoIC:qkmnpomddpMOtEvwDpjJGYQbN/PKwMC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 1ab028040db32cc71f669e214a927e07_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections