General

  • Target

    b15a8ba488eb915af82e7ca4d0f20387_cryptolocker_JC.exe

  • Size

    122KB

  • MD5

    b15a8ba488eb915af82e7ca4d0f20387

  • SHA1

    79f6a1ace3be26d265ab78a5e856164933a09c05

  • SHA256

    015c207ca879b433fcdb6e5a549fdd1a22e4e7964a22e9b597f5c66ab7b090da

  • SHA512

    05423a4802ac2da8a70a8708b286151afc25a0b0a7d3c19de6c8eaa718487727a0411b7fb0c31cce0ea10b92fad3f97eb8eb25da326ee31f3663fa413dbcd952

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgp699GNtL1eO:AnBdOOtEvwDpj6zo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b15a8ba488eb915af82e7ca4d0f20387_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections