General

  • Target

    4d2c74d4117bc13c056d3fbbe6226985_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    4d2c74d4117bc13c056d3fbbe6226985

  • SHA1

    b55416d1ce57d9478993f62948f3432f30cccda8

  • SHA256

    6f2a4fa06b39c70414fee862e2b6b5b620325691d90256987ad24954ab18adbe

  • SHA512

    285671cde8a20a3a89b99f5c7a95faaab71506afb33d1343bcbd8faee838972c6e551dfb2e0bb43db6bef0ae0ca167d0a45044c9a8bab43ada064bd55a105faa

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhQ:AnBdOOtEvwDpj6zR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 4d2c74d4117bc13c056d3fbbe6226985_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections