General

  • Target

    3d4c39f95b13e03ea8cbf3c5af9a9b53_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    3d4c39f95b13e03ea8cbf3c5af9a9b53

  • SHA1

    9f59f7eebb49c900d7d211667d198cf94b3f38cd

  • SHA256

    54dc6d948267613b11f84c8350268d88e1598f644ce393c47bc33711c329e71d

  • SHA512

    9691a1d7bb4f16bc205dce2ae07fde8442002a0328325351c7efda9ebcf7619c07372a04e4caef481086f45a51e7a31dd6b8637308af8b5402c7599b037a1ebe

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gZWMum/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gZWZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3d4c39f95b13e03ea8cbf3c5af9a9b53_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections