General

  • Target

    268f0747e613f65d0a14fd0d97fc44c4_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    268f0747e613f65d0a14fd0d97fc44c4

  • SHA1

    1b38a6e269de364cee15d2fffd7482025f69d56e

  • SHA256

    1a32c87bcae5458dc5d8d0e11bad0a752f88533f85854f0d515083acc3930db0

  • SHA512

    4875e8e8134b5a3ecd5f1b6138cf744f1f261705d78beae4e4acff79b938aa02114c14bf3c0e8d63beb0e46b93018edb0131daa5916d59839469d7760f19e170

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviA:AnBdOOtEvwDpj6z2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 268f0747e613f65d0a14fd0d97fc44c4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections