General

  • Target

    769612adfa44636df991c41f1538021f_cryptolocker_JC.exe

  • Size

    121KB

  • MD5

    769612adfa44636df991c41f1538021f

  • SHA1

    b22cdd0bc2029bf13f9bb01ba65f93dab2cae537

  • SHA256

    1dac40899005a7a7c5c88345c89949a86d40961cec6a8c13b9f67a22bb9e3283

  • SHA512

    96e405ae9baf4af89cc87ffe831a145d69d6baa4ede04a09d46eabfc1c713c9cbe2b818c99da913ce5c0bd8db8d9835726f144b97979841b1c867eb3af3c1c45

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eX:AnBdOOtEvwDpj6z9

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 769612adfa44636df991c41f1538021f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections