General

  • Target

    3496318215aea754a7dbd3c13fc75817_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    3496318215aea754a7dbd3c13fc75817

  • SHA1

    89ad23d1f06ec8adeff42bb5c21bfe450a9db9ad

  • SHA256

    b6bc73fe83a44e03a0fac3695f42bf0b290bfd9cf4ae6b8ed492b28d4dfdcbd2

  • SHA512

    04c3dee87ce3c90c4f5f68b1ab60bb08f40881c6ed6d9f231f6d399b34c87f68b032903aaf84efad0acbc86450a388fc1d880b43ff6df4f5fcbb92ab3c11d47c

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gZbMum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+gZbZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3496318215aea754a7dbd3c13fc75817_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections