General

  • Target

    3caf17175f205c76adc3c8b84541b5b7_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    3caf17175f205c76adc3c8b84541b5b7

  • SHA1

    257f7048079df3d1d8e6320d2799fd43b7d247a2

  • SHA256

    020cc7e07e1d846dfa13b68af08cb1f5f69dab504ba31849d64e1e1b3788c2d6

  • SHA512

    75fc70e04627b3f937a99134952b9f6d6ceeea29691d9b90694cdf896f2d2fdc9a80ee5399a11e7b0f5d040f1feb210f21267f75b2d6eb6f97c79936dd956976

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQb6X:z6a+CdOOtEvwDpjcz6

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3caf17175f205c76adc3c8b84541b5b7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections