General

  • Target

    28e5a7833fb7c2ce7d05c1421b905313_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    28e5a7833fb7c2ce7d05c1421b905313

  • SHA1

    848268b8c9db4c690cf3ead1868c574a69922926

  • SHA256

    4a6f4acdfdd05e52d542ef283258be7c4ce271597f3ee63d3b05e4177e47b93e

  • SHA512

    09c9c4b385872dd1ae9ec50f856ce88e066d8192d19f53a57abfcbab71d64c323b96c8448272ceaae4e31adaec3d1cf6abbfa07a08d915d0121a6ae410986618

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1M:z6a+CdOOtEvwDpjczv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 28e5a7833fb7c2ce7d05c1421b905313_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections