General

  • Target

    3dde414b61626ab1fff51bcc9f20d9b3_cryptolocker_JC.exe

  • Size

    136KB

  • MD5

    3dde414b61626ab1fff51bcc9f20d9b3

  • SHA1

    f31f66eed4d3c73e474b0164e20334aeae94b8b0

  • SHA256

    d822735dcc83e40a78c3b84b457146034840445a5f830b883d440439006f03fa

  • SHA512

    6a5202739841fce57e9263fd047b592dfc4b5f7d319f05f77866d229301166c926cb9e2b5856d684c10abbc252fac040875e433557fbc235cb080757c7393352

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1H:z6a+CdOOtEvwDpjczs

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3dde414b61626ab1fff51bcc9f20d9b3_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections