General

  • Target

    784011b9fa7a5eb41218e7e4551a3784_cryptolocker_JC.exe

  • Size

    92KB

  • MD5

    784011b9fa7a5eb41218e7e4551a3784

  • SHA1

    4ed63c067d491fa9f446cb6fb74ad047d6128f68

  • SHA256

    14cbcc6ee50d621b806491c653c1e6b7b9a50ff384dc8d3c87461a5b2bf0e342

  • SHA512

    59e954ecb59993b6589f5d12eb329d8c4e1b9b255f7485a9a74cf939310060d5ac3263a4afe5fcdd0080e5e796e0fa13d3b8408a78d9b65e25f7772213524e14

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpMx7iO:AnBdOOtEvwDpj6z1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 784011b9fa7a5eb41218e7e4551a3784_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections