General

  • Target

    508d40398510a48304aa4fcfb32a87c0_cryptolocker_JC.exe

  • Size

    122KB

  • MD5

    508d40398510a48304aa4fcfb32a87c0

  • SHA1

    5341c8a73ff82483f297f1ec52e633788bb34515

  • SHA256

    fc958ca507991cfa8b92cc7cfa7fb91dc02a68633c5939470adf195c4759fa6c

  • SHA512

    7dded785c4a8fb51131e3bba52d60c0d18167fa18916ec6e1eefc3db058cc6b95c8ac56e4930d4788e1df2515df5038fdf4dee6cde4a950bcb6b57e928923fcc

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e5:AnBdOOtEvwDpj6zz

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 508d40398510a48304aa4fcfb32a87c0_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections