General

  • Target

    6f4916d13806e751b8770ae844008e14_cryptolocker_JC.exe

  • Size

    81KB

  • MD5

    6f4916d13806e751b8770ae844008e14

  • SHA1

    7e1a675660ee0385f5baf16b6a22db8961086be3

  • SHA256

    b512486afd809d624498c83daa0db9742d8e9e0ca4b99012211073095c279e50

  • SHA512

    d5b9dc71f761a0373597351f5b5eb4eb5dcd5d9f98a0effa54def3ac19c214a9ade1c262ca7db4da0e8550465fe92346a9a1ff3d4d7b04dc4182055a84e40ad0

  • SSDEEP

    768:qkmnjFom/kLyMro2GtOOtEvwDpjeY10Y/YMsvlMdwPK80GQuchoI2:qkmnpomddpMOtEvwDpjJGYQbN/PKwM2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 6f4916d13806e751b8770ae844008e14_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections