General

  • Target

    40423e64a17d68647f30ad3dc2c3b7ab_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    40423e64a17d68647f30ad3dc2c3b7ab

  • SHA1

    d14ccd70252d2d14405ffb6e0cbea18e7b392472

  • SHA256

    9f55d4565d2dea4a3c1b241c8b4e97b89cf9fc03d40123e53e00f242ba4cabf9

  • SHA512

    abc70f0fc3db9065734e2463da4675cb8b494529b69dcdc464778e9f1fdeaa7e610409a2968a1beb04a9c3c0f8d3e9d35c0fd39965124f265f6f96f4c76c928d

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn58+2TF:1nK6a+qdOOtEvwDpjd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 40423e64a17d68647f30ad3dc2c3b7ab_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections