General

  • Target

    326d5b2c2c02652fc3270bd2a13a496f_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    326d5b2c2c02652fc3270bd2a13a496f

  • SHA1

    29923d489fea17baac5b5b1cfbe73bf868d948e9

  • SHA256

    801e81b9f4b454f835d317361e39e778ae8d327d71c413be0e6dd6e6912c90c7

  • SHA512

    c49cdf682fb321318d11e061adc614335232d6ffeac869fcec9edcd715e256422dde1c061e319d51d9a7e164883dfdcf62f70f5f40c4b7b1149816f72f131189

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZs3N:T6a+rdOOtEvwDpjN8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 326d5b2c2c02652fc3270bd2a13a496f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections