General

  • Target

    fc271014ac5119e5ab4d4ea8c7792124_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    fc271014ac5119e5ab4d4ea8c7792124

  • SHA1

    71c6ab624145b9133dd62795dada52dd0bac804a

  • SHA256

    b0c471d1614ad6e73970da69e604ed0eebe2399185ad0fb92917832f71db99d9

  • SHA512

    71549bed0066126e18e376be1d8e9ff3e3d15cccb804dc8e058085ac08291bc8ff3b9290ca2618b6d6cd20f112c560364c10eab8b219acbc02c8b2939f322a2a

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhf:AnBdOOtEvwDpj6zK

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • fc271014ac5119e5ab4d4ea8c7792124_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections