General

  • Target

    383b0742c51b15f8d3a826054c07c9e1_cryptolocker_JC.exe

  • Size

    62KB

  • MD5

    383b0742c51b15f8d3a826054c07c9e1

  • SHA1

    407e83c29beacbebfde81af1463c9dbd40020a62

  • SHA256

    191ceafbc9ea53a4d7a1760ea0c746cc1ee3fd346d919c35f8db3d0a6dc1d82c

  • SHA512

    5c77144fe536ef88c18078da53539efa2bb36df79c6c512b5c2a78cc2b9f44fef750bb7801f7edad46435b7d417d29f7626e9c8f96b789116f6bce5304afddbb

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5aFr7YO5:z6QFElP6n+gKmddpMOtEvwDpj9aYaFA0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 383b0742c51b15f8d3a826054c07c9e1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections