General

  • Target

    5991416e070dc9c96626bf65f84a7a14_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    5991416e070dc9c96626bf65f84a7a14

  • SHA1

    3f8b592bdab9826db3643b1af3f972c5c292e12b

  • SHA256

    bf33165dd2a3765ebbaabf7247b01d4c5e3d964c584a876997aead0e4e9e9ebb

  • SHA512

    017112c5a785d366e78f5d8aef92314fad0e64b3933e4d61c1b8acf13bd92269330bdc2d3b1032ebf0c3906dc9ed923397f24aaea86a83f7137c932caa1ac551

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhi:AnBdOOtEvwDpj6zn

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5991416e070dc9c96626bf65f84a7a14_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections