General

  • Target

    e92e2e7427891f517a4775bb4545cfac_cryptolocker_JC.exe

  • Size

    41KB

  • MD5

    e92e2e7427891f517a4775bb4545cfac

  • SHA1

    4928277be4a4b40ca5a35b8d966b2a4362d7dd21

  • SHA256

    2dcc65f96f7fa1546363eaec96c8c50a4d322a0cb479de0f681bd85503bb3183

  • SHA512

    5e001c3e0142598b4e11d6169d916c73ebf196d44b5603945040d8641554dce8963530b36b37f402a3db59f406c81f8e7f36a38864ca152f9551568b0999d1e3

  • SSDEEP

    768:qUmnjFom/kLyMro2GtOOtEvwDpjeMLam5aFr7YOzzOQjCvk:qUmnpomddpMOtEvwDpjjaYaFAel

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • e92e2e7427891f517a4775bb4545cfac_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections