General

  • Target

    414d9a928f8967c5a91bf5d0133c97ed_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    414d9a928f8967c5a91bf5d0133c97ed

  • SHA1

    41e1f407520068f4c8f0e20b4c59a448cf77f4c1

  • SHA256

    3884e4e961a49ecffdf7bf2d0bb4bbbb10e758059a5a2e15f2c66975fd9b004a

  • SHA512

    5f265aadb587cae7d034911ee1ba2c20d71549d1666d0eb8b61a96ff2be7180bf9bafc2db5f6ecd56a5f2861085c8a8788bf8c8fca6213b48765c773bf465b04

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjF:zCsanOtEvwDpjw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 414d9a928f8967c5a91bf5d0133c97ed_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections