General

  • Target

    39e13e39b0f3e03105e237f8d3ee5c70_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    39e13e39b0f3e03105e237f8d3ee5c70

  • SHA1

    7ef2069d1060783cf6f1cd987893fefc9ff59120

  • SHA256

    4612ff73083743a5a6623ea30dff636a65a2dbef1626b560c26d80e516ee6e8b

  • SHA512

    c437221792c26cd8ca19478be1ad8566afe70a4aca26b441be0732d5a0398bf43e0f6149f73142ae6045ad738ba0f5dc670372cfe60a1cce99b483cdf81adbce

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+s:T6a+rdOOtEvwDpjNO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 39e13e39b0f3e03105e237f8d3ee5c70_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections