General

  • Target

    fef8d2b540c3d194ebce0974dfeb3d83_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    fef8d2b540c3d194ebce0974dfeb3d83

  • SHA1

    85a7253e61287414cc1869e1d088df6192722a93

  • SHA256

    1d2125937e818f5ea783bc8b0480380803039c92067f4dd9c4c58025e9498e45

  • SHA512

    caf5752444ce96a9e0955ed477bac6efb351df38ffb434e8e7451e7da2970c6caa8714c006cdfea992a1ce3581307bd9659a8bc305397873ab25e30796407778

  • SSDEEP

    1536:qkmnpomddpMOtEvwDpjJGYQbN/PKwNgpQbCJhm:AnBdOOtEvwDpj6zL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • fef8d2b540c3d194ebce0974dfeb3d83_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections