General

  • Target

    8a8460068d19a6b12a314239dac7282a_cryptolocker_JC.exe

  • Size

    121KB

  • MD5

    8a8460068d19a6b12a314239dac7282a

  • SHA1

    d204140ab8de78d1b3449796438632fa974c67ca

  • SHA256

    eea592c4caaf962cff9daac985ddf3769080c96bcc4849cf9a16187231a8c1e3

  • SHA512

    24b1d689d2f4cf0cd84d0bc2b96d531f8e0392df7307709a073d667e0ea8916fbad640ea8db57e5cb03f2c650a21d1697b9140eed7cde18c685e1e2fc81135e8

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1e9:AnBdOOtEvwDpj6z3

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 8a8460068d19a6b12a314239dac7282a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections