General

  • Target

    39188848b79525d743bef8bbbdcd2333_cryptolocker_JC.exe

  • Size

    61KB

  • MD5

    39188848b79525d743bef8bbbdcd2333

  • SHA1

    6307a631b48c7f92f10ca95018f748359ca0834d

  • SHA256

    fa2d9c2a07f79023be6824921eff7e3c951d0490a5eac9af7c57725dd5393dfc

  • SHA512

    9124fc87abb0d808a7b99586d158d6b97bcb349fd590dd7208aa2b4578d9a1c34b671f1be5d7f01613d45d6a0e41a6274a895d3bee7012a65dcb47ff293235ea

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhtP1:1nK6a+qdOOtEvwDpjH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 39188848b79525d743bef8bbbdcd2333_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections