General

  • Target

    cb9391a45a23df7f6e68504960e3762f_cryptolocker_JC.exe

  • Size

    90KB

  • MD5

    cb9391a45a23df7f6e68504960e3762f

  • SHA1

    2b8afbd5db24613c54f185b5d176157c9a89ee1a

  • SHA256

    b4566dc2405f9028f2365f4313cea7f0fc42def8496798924b7b32e9805237e0

  • SHA512

    d75550f29d78b18f593da3ab09a59554adbb9455ea340c6e65944a5166eb8ada663a81796b124949b8198928d1f06dbcdb4316a9407c3e85338a4c4b1001a073

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwN6b41A:AnBdOOtEvwDpj6z0su

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cb9391a45a23df7f6e68504960e3762f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections