General

  • Target

    394c112f3aa674b1650fea8fb6407ae7_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    394c112f3aa674b1650fea8fb6407ae7

  • SHA1

    f64e3f432fb9c24a6dc433c8c4fc6cd03a1f3ee2

  • SHA256

    dc21dc4560d51865ca21a4a70e7d3a9262c1dffe78301a20cf052f8ec3943f4b

  • SHA512

    89d85023343a465295e31df40958d672e249ce53be1bb5f2c4ce0f66f5723914b6323a2399479dc16d8e12c471b7829bc584589797ffb339ac1f8a3c8fa1a428

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUW:1nK6a+qdOOtEvwDpj8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 394c112f3aa674b1650fea8fb6407ae7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections