General

  • Target

    28731b1c0613df2293107e7603c8163e_cryptolocker_JC.exe

  • Size

    80KB

  • MD5

    28731b1c0613df2293107e7603c8163e

  • SHA1

    b9b289d1e0f49d09831bfa8c3517086b7b32c5ce

  • SHA256

    b0145f6867b2b0a7a21b8c3f1fee5c5855b7850009c9d9243ea236a416c853f9

  • SHA512

    d7cbc543223bb7898f2fdbcf621a36b3a2a725fed5064ca3d8001e3f9c135fc28367bda3ed6024c8aa40c6bfe63b6d2fc2432557101583f1ae276a278133d214

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchqMx:qkmnpomddpMOtEvwDpjJGYQbN/PKwMqI

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 28731b1c0613df2293107e7603c8163e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections