General

  • Target

    b59c87b3b828d5a1b7a4bf70875a8655_cryptolocker_JC.exe

  • Size

    32KB

  • MD5

    b59c87b3b828d5a1b7a4bf70875a8655

  • SHA1

    5f9f62782145611f67277036db71e47ab90f4ca0

  • SHA256

    36a0cae3f1660ac8575a2ca61d71ff38d734d88d7fc369968dabb31fd451b78b

  • SHA512

    0acf8025b70d7f147a093e6f0766a0165dcaceeac106366fdac426589a8f5ad0b0c3b97c2e73e386df6e18da45f47be5ff7d2a9db01bb91e1a4d43331c284808

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLa7o1e:qUmnpomddpMOtEvwDpjjaee

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b59c87b3b828d5a1b7a4bf70875a8655_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections