General

  • Target

    3ca0d99bf51cdf8984d15dc461f1aecd_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    3ca0d99bf51cdf8984d15dc461f1aecd

  • SHA1

    d26f7eaceb82df5e0a8aacbeae5e916bbb5326db

  • SHA256

    d16261eda573052740a88225308cc05c410f144b1275db7ea7b5bb1eff0e3c08

  • SHA512

    96bd297a9b93cfd82edc7b68e4c40a35df3f7c6ed11573875b97673d60468f79662380b5284dfcb4bfa82d4f46fd380e5bbc3c23797fa7c5861552965b54a639

  • SSDEEP

    384:z0VkMq01bJ3wtEwPS8HLEh+Jagz+3be+26JWFQnYkW0NrD5v6ntOOtEvwDpjqIGa:zQz7yVEhs9+8aJP6ntOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3ca0d99bf51cdf8984d15dc461f1aecd_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections