General

  • Target

    feb64d8ed36a5753a4b1c413bab2f018_cryptolocker_JC.exe

  • Size

    99KB

  • MD5

    feb64d8ed36a5753a4b1c413bab2f018

  • SHA1

    dc9ec26833a1a345a0cb44abf9d096f2199a4840

  • SHA256

    a5a0fabeaefdce0b79ea32a5843c50a354605a6a2c1ae7cec70ebaae3627dbb3

  • SHA512

    404c03cc68a545b0ba05e6a763ae394cf24a41b7769ab5689d0d8456cf0d5d290c475bb788de23d340ae350de5a1ef7fb56658d4d1baa95e0d71c8137903b5eb

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJjMco2E:AnBdOOtEvwDpj6z5

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • feb64d8ed36a5753a4b1c413bab2f018_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections