General

  • Target

    3a7ab3442c745b7877a81fe9b246a318_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    3a7ab3442c745b7877a81fe9b246a318

  • SHA1

    4a8da06f596f1e16a55501e13526e3a859647e24

  • SHA256

    5d12b0d9c91185f0b03bfb14ed70d054e09438f03d791e9ae969578ea658aac3

  • SHA512

    56c5eddc35297bddefa0aff89cd6da428029829f0eadedb8343adba87e9a7fdecabfdcd54a914601264451e5ee1d339e94a82e5cbdb9fdae4b94a390ca4ff601

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gsNum/kLyMro2GtOOtEvwDpj/:z6QFElP6n+gs4mddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3a7ab3442c745b7877a81fe9b246a318_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections