General

  • Target

    939ae83229a3fcbaf32513eab526f23d_cryptolocker_JC.exe

  • Size

    121KB

  • MD5

    939ae83229a3fcbaf32513eab526f23d

  • SHA1

    f6e84593521b3d3200e447d4d88e5cd92f3b8692

  • SHA256

    babb1cfe520d1a4079518d6f20e5ca63ba37394d97a913239a4e35b3861cacc0

  • SHA512

    101f1d500db3c76549ce1f2945447f0592546300a3ac9ad962bb78a0881e06466786bbdd7b7779134c8a6c2d1d923f911dd80dbe3652c8fa7a981e069511c5e0

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eW:AnBdOOtEvwDpj6zw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 939ae83229a3fcbaf32513eab526f23d_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections