General

  • Target

    7afaa07194a927253ed111972af6379a_cryptolocker_JC.exe

  • Size

    99KB

  • MD5

    7afaa07194a927253ed111972af6379a

  • SHA1

    63cf9179ff2224f620a875117038ea79283f32eb

  • SHA256

    5a91e290e04ea7c54f50f963395c877e13d19a660695216b7ebaf26d88011498

  • SHA512

    50c7c7b84614ec7c548e554fef1241865a260ed51a81dacb79a3de851485a3548ac47fe1d8c695df52efb0e42a712fd464d4c87a9d71fff6f7c15b4835fd5be7

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMco2J:AnBdOOtEvwDpj6zM

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 7afaa07194a927253ed111972af6379a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections