General

  • Target

    31b13ba9cf848e5513b3a7ab9facf0da_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    31b13ba9cf848e5513b3a7ab9facf0da

  • SHA1

    772f2d46ada5e96450201c4ed6d12b0c30381ed3

  • SHA256

    c905312fe895829fa985d2fbbf0f9748f8993009aa113269ee03feb87d5bdf58

  • SHA512

    7cc97bbe64a91e53059039c25d243278c5a8f37d8d70b7be33a5b4c1af920c10c847e5afb32a7446bb9fd9cd8ab43f20a28c46e41a193a594eab2a1bdbe377e3

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZt73R:T6a+rdOOtEvwDpjNF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 31b13ba9cf848e5513b3a7ab9facf0da_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections