General

  • Target

    4726a4bf2d4cae0e6d780c18f983be87_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    4726a4bf2d4cae0e6d780c18f983be87

  • SHA1

    e18c5b78675966e8d311f18ffb26fe684ed02e3c

  • SHA256

    26b3f60175698b4c8c404a0761621397ba17580c940bd9034b3dd792dfc3d027

  • SHA512

    36012be274464bd33615464c5073c21f0c526f92baf0f81fe56747b1f96e1cb1274409e7c6d430118c770a3d9941fb4fc10192f37b8ddbeb396f81acfabfc533

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNuRWGb:AnBdOOtEvwDpj6zg1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4726a4bf2d4cae0e6d780c18f983be87_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections