General

  • Target

    41213b0bf30025b850e5f894d954ecc4_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    41213b0bf30025b850e5f894d954ecc4

  • SHA1

    9211a99f53d4822532d90863c20e190d81d4d6c4

  • SHA256

    dac28bc7d2cc1dfd9553f66c3ab517244fac4dda397df222adea3092fe0deaa1

  • SHA512

    b1f46d23edbd8cf268efd0c747baa7f3f3853bd9fcbedd888e679a964916499d4ff4deeece7782431b08ad09d94404928f344034d73ecef4920e65fb8091c8c8

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjt:zCsanOtEvwDpjw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 41213b0bf30025b850e5f894d954ecc4_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections