General

  • Target

    537f0996a50a8fa524d47cf481db8adb_cryptolocker_JC.exe

  • Size

    32KB

  • MD5

    537f0996a50a8fa524d47cf481db8adb

  • SHA1

    9c456fec15e7a9fad3671dce18392fd8226794bd

  • SHA256

    7c00c5731d7d1b05697ff43854226bf598a4b1a0c47dea0e39e40ea6a7f5e4c7

  • SHA512

    a3de1b8cf9387444eac702b9a14ae4734939bc0a271ddc9683b172b4e3ad86bd2f3fac974c0676f0c887458823ea949f8d7b1d1cc74d69722c8918cb83e4937d

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLa7o1m:qUmnpomddpMOtEvwDpjjaem

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 537f0996a50a8fa524d47cf481db8adb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections