General

  • Target

    68de2a470bfb352391d9c4fc3d443f30_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    68de2a470bfb352391d9c4fc3d443f30

  • SHA1

    148406fbfde9ed9df4bb9481ebf4fff585f91d64

  • SHA256

    ed6b22db2ed8c98c5803c3f559c99e3221544080177999bd2066d03a0a52c9bc

  • SHA512

    42acd31d2967d5c06cfe78e954eddbec854bd16478bef3dd0d03096611b8e5d875444178efd6c36bd0ad03d896688a23f0a7e3c309537e2e7cbb60932cff0c25

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwN79M:AnBdOOtEvwDpj6zLM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 68de2a470bfb352391d9c4fc3d443f30_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections