General

  • Target

    350635087f280e863d9416a7a5d8e9d9_cryptolocker_JC.exe

  • Size

    119KB

  • MD5

    350635087f280e863d9416a7a5d8e9d9

  • SHA1

    f8a15fec72a620eb34f1dd5583eae91328e9f364

  • SHA256

    37e4549cbc6bb0f9ec2a199df4ed2783a344ed74f67868c75a48fe790876eff9

  • SHA512

    a99d9088dcbaf5a7fca6b3cc38ba59b387e39b130ac9c4a8c8e0ad1bbc092448b1bac1fdff3535f38ff20ad1dab41b66c168030bdcfcda6da86fe6c45741111b

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjw:z6a+CdOOtEvwDpjczb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 350635087f280e863d9416a7a5d8e9d9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections