General

  • Target

    35b93f8c26611afe50618baf9543a636_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    35b93f8c26611afe50618baf9543a636

  • SHA1

    962616cdc42bbf7a8f5ed605634b7afe6aa6b93b

  • SHA256

    accfd4b36c40922eebffc09bb0b475d3057e8adb6e8e4873c8d50aad9620706a

  • SHA512

    d0ce167c8c80a754d2ff3361ac48737b0448cdc00c2f83bd0b274e219139ddb479df8807529598c6069e6642a2a23c7ada5b0a7c65059c3154663118be7a59fc

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gq:1nK6a+qdOOtEvwDpjq

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 35b93f8c26611afe50618baf9543a636_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections