General

  • Target

    cbb693eb4ba567d61297e54ccf37e48a_cryptolocker_JC.exe

  • Size

    32KB

  • MD5

    cbb693eb4ba567d61297e54ccf37e48a

  • SHA1

    c2e97f1dbf06082742cb8cadd1e1bc1930c52c0e

  • SHA256

    cd593466a30d7463b12f2991566201154598bce1102ff59c78112031ce91022c

  • SHA512

    1b1229f78cd7ae41e46869ea01cac925b360bd3182ae75d6a59d75882517bb3dbf043351f0266aa5dddcaae84cea3ae61482c13e98e5106260c14f8e35aa8deb

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLa7Q:qUmnpomddpMOtEvwDpjja0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • cbb693eb4ba567d61297e54ccf37e48a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections