General

  • Target

    434f70f5f954b9330ce9ef2db2b87202_cryptolocker_JC.exe

  • Size

    135KB

  • MD5

    434f70f5f954b9330ce9ef2db2b87202

  • SHA1

    9994ca674c6c3f047486fb3d0eba5c0781445c0e

  • SHA256

    64e5d9b979be47625cfdd13fe56cae912a23214dba04c7ac00b1be457eb5da55

  • SHA512

    a6686c4cfda0d750ba2961993830cb566ff7a99aaa1329582a843015eee9441b15eb59006c33302ee792a0ab3aee255811a301f2fc7dbe2b7e402484979cf89a

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/Ttf3:z6a+CdOOtEvwDpjczA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 434f70f5f954b9330ce9ef2db2b87202_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections