General

  • Target

    326eff74d1ef1bfff6a3d08f3059690f_cryptolocker_JC.exe

  • Size

    97KB

  • MD5

    326eff74d1ef1bfff6a3d08f3059690f

  • SHA1

    dd9b12a1ecb365087f689214431375b7dbd852e4

  • SHA256

    682fcaae1336084a005d95b7cb775ec373912457db921866011c3dfff12e6eb2

  • SHA512

    d2bf216f73540c589e79d97a3c5b88da35d51391efe78b2b036e988f37ce6a4808235a8dbe2af009170502fcbb89e2436632234bd3ca40416cae96ce23241ddf

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gjt:1nK6a+qdOOtEvwDpjh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 326eff74d1ef1bfff6a3d08f3059690f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections