General

  • Target

    3a30c5320774f3416ceb38f2c0bf368f_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    3a30c5320774f3416ceb38f2c0bf368f

  • SHA1

    733aa619dbe6c7d3e449755f71885098157f052b

  • SHA256

    f1aeca84785122a9d63a2021bcae124888eb67d90b2b2048842c637be004c26d

  • SHA512

    66e4bf71b42922a3b1fe24cd6e65d4b8b451017d15602058075b2d1fc15afbbaaf9debe793bdbfd8f8181c9daff0db95bf7becf06617116aa3b44d96eec08562

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT2:T6a+rdOOtEvwDpjNW

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3a30c5320774f3416ceb38f2c0bf368f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections