General

  • Target

    294ac460406ce26f341be560ec504030_cryptolocker_JC.exe

  • Size

    76KB

  • MD5

    294ac460406ce26f341be560ec504030

  • SHA1

    f9532bfabe59dc4132df6cd4b81d4ce3ab3b6a49

  • SHA256

    d343f648142daa9949c0fad3a2252fdfb49f803dd1734734554a5006f8f62e5c

  • SHA512

    785b627c744c04b376e9cbe2d1495e278b81087dfe0b9d693959262129e380bcc9122d28c2ede0921c1dc842984d3e402f8338505602971b2a45cf64e9dcbcab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTz2DI:T6a+rdOOtEvwDpjNF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 294ac460406ce26f341be560ec504030_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections