General

  • Target

    3c1e1b4268921fced69a9a9f60cca956_cryptolocker_JC.exe

  • Size

    100KB

  • MD5

    3c1e1b4268921fced69a9a9f60cca956

  • SHA1

    28faef68c91c0403946fc7dfce86bcc6ee8919d2

  • SHA256

    f0ef2981e6f1f942cc6909e495c4e23da5d7ddcd8d5e104600b5baa6a44115f9

  • SHA512

    3c6d306bd8b38aa40b3c23545065c02cc643e4af8dadb469c1e792d615d09108d182a0c4e219cf4203882da9c3f629e2be8bf75e5a7867f4ec9ba21b60c3c47f

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+y:1nK6a+qdOOtEvwDpjh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3c1e1b4268921fced69a9a9f60cca956_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections