General

  • Target

    3de7aaf8caf9f72fc4f957da4a7cf1a7_cryptolocker_JC.exe

  • Size

    50KB

  • MD5

    3de7aaf8caf9f72fc4f957da4a7cf1a7

  • SHA1

    8803c606e95a6858dea6721d3b48ef0fde55e8db

  • SHA256

    19c48a93a7dc3bf11a1260cff4b373c870fccca2e146069b166d431bd042cc9c

  • SHA512

    f83dffee1cc5e8a7adf216c3a72417d918dad3abb1ae7c0f6d5131d479d3b0d068f9248864e9c6be25663b6e6aabed34c9dfc340370e334b118fd361c06ebdf9

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gbum/kLyMro2GtOOtEvwDpjKv5azz:P8mnK6QFElP6n+gymddpMOtEvwDpjoav

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3de7aaf8caf9f72fc4f957da4a7cf1a7_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections