General

  • Target

    421dfa6e63b6c61de65457413211673e_cryptolocker_JC.exe

  • Size

    86KB

  • MD5

    421dfa6e63b6c61de65457413211673e

  • SHA1

    dbe4c77aca563eb98a4e59baf179772abd89d18d

  • SHA256

    7bc3e3816fc1bfe9c544008f786f75aa1e7df5aecf8e48990576b54099ef9c5f

  • SHA512

    130ef139ad8ec1f9e81fedf9e541f116c4b1d5b7b69ef0196667b72d34a32531bd02fb0e1ddebfa781e032184c64881f7cf8b43236bb547fbbfd6183a2872ebc

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj+Xi:zCsanOtEvwDpjo

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 421dfa6e63b6c61de65457413211673e_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections