General

  • Target

    4171c96856553a0659d4f56c2899d664_cryptolocker_JC.exe

  • Size

    65KB

  • MD5

    4171c96856553a0659d4f56c2899d664

  • SHA1

    925e446971895bfd464ec11cba760291c53db443

  • SHA256

    42f407d1494b88f16cf412f1ed34b34d9c393309eeaca84dd8d7d4c2d7295ee1

  • SHA512

    32dfd01293f0c3b6945f90f51d4cf866c6e3b6cba9ea2854a3c267d5ddeb7112346d714b750ce2aa5107c807f7ac45c63500c43682766d2a20c51a37b439f3fe

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzM3:1nK6a+qdOOtEvwDpjF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4171c96856553a0659d4f56c2899d664_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections