General

  • Target

    4149b989837b8f582671c40c608eb112_cryptolocker_JC.exe

  • Size

    59KB

  • MD5

    4149b989837b8f582671c40c608eb112

  • SHA1

    490eea573395ce21cb289d260cbffb5378c2b0dd

  • SHA256

    8c8d5689a65f8a90cd7377512a638d6b7e0f84ad6a05853be81a17287d14fa63

  • SHA512

    f7f2a687cafe1255cb71b6d62c2ac1d9b781b9139c05bc376db1c0647f6c1338447e1488b7ca6404095f910b574226e98381753d84d6cdcfd4695df819c10da6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYXUe:1nK6a+qdOOtEvwDpj0

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4149b989837b8f582671c40c608eb112_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections