General

  • Target

    df6024562f8fdf404d9a91c8d511be9f_cryptolocker_JC.exe

  • Size

    41KB

  • MD5

    df6024562f8fdf404d9a91c8d511be9f

  • SHA1

    6a8f8288e0cd0e48b6551f0fb4a5b0eb8b4d80b9

  • SHA256

    7c8e2d39dffd807a9633be05308aca38d83130e1467cefa2b9c404397a37eafe

  • SHA512

    6b2c00128644729764c87686ea4acd57fc6a21366d5d7094cfe27437108d756f12e48bd1b33ae2762670ca7d9f12772ed5ebab8a9c8ea58686db3f51d0b8509b

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOQjCve:qUmnpomddpMOtEvwDpjjaYaFAej

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • df6024562f8fdf404d9a91c8d511be9f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections