General

  • Target

    f72a300c6d6bc00f29bcff9c95e8d7ce_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    f72a300c6d6bc00f29bcff9c95e8d7ce

  • SHA1

    26e6024c6b0021530a9effd124b68a78d20b2a1d

  • SHA256

    fa426a6538fe841793c0db2e9500c1eb94edfd3c202a6300ed43b3418d1d8731

  • SHA512

    fbb7ee3e4065f4bd8c92c78b5332a53e7ae5d63d65b9ffa7814aa893452c0c0c88bbf69954b33c4d7bd1054ba01d6731e1af1cd52cf43cda9a89e362f8ead2ae

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhJ:AnBdOOtEvwDpj6zg

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • f72a300c6d6bc00f29bcff9c95e8d7ce_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections