General

  • Target

    28c59f3d9982b0f1c64be37a0582fe13_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    28c59f3d9982b0f1c64be37a0582fe13

  • SHA1

    33996a7bd1616fc42fc1c6634625a3498940584b

  • SHA256

    59f6113b5d270eaa7393551050d334e4ed9d75eef8cb7e74ad9e7567c09b57f2

  • SHA512

    70f5cf89d18d3a30e59be839a38155e0a462717a8ab08aa893e759029d248bbd53c9b1bee8506f62a0ad659493fa85f614fc9a2545db1fdc8d56f30017fa0a58

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtLYc8N:z6a+CdOOtEvwDpjcz1

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 28c59f3d9982b0f1c64be37a0582fe13_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections