General

  • Target

    40d16881582818b4736c4401bf01d265_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    40d16881582818b4736c4401bf01d265

  • SHA1

    4d1497a0d6cbc065677c4f27cd11e57a84b04e31

  • SHA256

    9b633a60373f56d22a99cfe4c8c88af9fc8de2193fe5c79d8315b60b7e6561a1

  • SHA512

    e09b34eb7a4f1a0903e5cef5a2f0168df00a9e1557a57fa620f642a33e785e89a7d094ebe49120e567864db1430925af5bfbb9cc741258a7819fa038e07d182d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtB6xdHY:T6a+rdOOtEvwDpjNtx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 40d16881582818b4736c4401bf01d265_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections