General

  • Target

    3c967456f2a26d1c4a4f46f144c62500_cryptolocker_JC.exe

  • Size

    56KB

  • MD5

    3c967456f2a26d1c4a4f46f144c62500

  • SHA1

    98cd355e534ade98ac54c6dc629da284f7ba9ce7

  • SHA256

    41891a1996cc8689703f307749c5ecc55feb175dd0e9559b0d770d364a4e3c05

  • SHA512

    a1666efcf1cdb630ab901f6d01f0f305da9ebc59d72a637d77dd1f75687db82a023387c43212b2c2b9d3ac43aa4c79d1028f17e32115e5388c3043aab80ef373

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelagPXPECuMpmA97bQx:zj+soPSMOtEvwDpj4HE9Mp997u

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3c967456f2a26d1c4a4f46f144c62500_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections