General

  • Target

    346f8d89ad507db98f38433286731f97_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    346f8d89ad507db98f38433286731f97

  • SHA1

    117aa9fa40230d3c4d09a5026d43f263efdca7a2

  • SHA256

    fce59a053c010ded0aa2916c0ae9eaf4e097dad10017dc87f31f70a0e9747a75

  • SHA512

    43911c4692ce7066f897223e674763ecfc3be6994cdd8dc6c4f60c46f3cac5dfec243ad77f3dce6b2d9a1033cde88772e608aac14d23df511dffac2b71b7db95

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsviN:AnBdOOtEvwDpj6zn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 346f8d89ad507db98f38433286731f97_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections