General

  • Target

    a9749e7d69accd3f1cb0db731b909075_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    a9749e7d69accd3f1cb0db731b909075

  • SHA1

    5199543f1731290901f3b4358fdc85d77d79af13

  • SHA256

    f370a7974ae469d18e45bbbf4c65a38d703c531d40758e3ac2c56b5a07e02023

  • SHA512

    638eaf485d5ce8567e3c45e387543ed36238b6f8f32373457a6ef0a54633fbdde1a3e3ee651183549d884a9edade2de0f550cfdf0e8a307a1a80f67b2d7933af

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNuj2ba:AnBdOOtEvwDpj6zG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • a9749e7d69accd3f1cb0db731b909075_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections