General

  • Target

    4cb16c19b0d5594bc63a26ead4f2629b_cryptolocker_JC.exe

  • Size

    95KB

  • MD5

    4cb16c19b0d5594bc63a26ead4f2629b

  • SHA1

    10261a13f1c5bf74b4849150886abb01d49eec9d

  • SHA256

    33d2a65d3a0ab1a0c824c3da00932e4aa1792a9f8aecb79d5616bb8d5eab6ee7

  • SHA512

    b4212777a19f41400200be292a08e803fe9e454d11d2e99b1e08290e9182f301178993dcd1717d897e022754579019781dfc5b0694f379a817d7d5404b2ca0fb

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpwqWsvir:AnBdOOtEvwDpj6zR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4cb16c19b0d5594bc63a26ead4f2629b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections