General

  • Target

    40a102583ea7872b50c3b25b8b29fc5b_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    40a102583ea7872b50c3b25b8b29fc5b

  • SHA1

    187d28c947f7214d21d42d1d3da01d15fd5c03a5

  • SHA256

    4c017125a2f62e3027eee856c9b3994b593c6312a90488d541ad203e1c162b6e

  • SHA512

    0e75e8b0c365b4947cf26063ccfdf2c5f37e06e7cb768020a7f61e6989beb6b10bd4edc03baeba0e6d70bbb1cde002d20d8834320c620e67e4da8f4dcae125d2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j68NRr:1nK6a+qdOOtEvwDpjZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 40a102583ea7872b50c3b25b8b29fc5b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections