General

  • Target

    44358bbd59a7feb58ae9ffc66250732b_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    44358bbd59a7feb58ae9ffc66250732b

  • SHA1

    38824e9f0e0bfb077947a100e2c4f38edcd112ec

  • SHA256

    fefd46e3ef4a0a47f2794d2954df29051a0fa93d2137c6cd37f442db50bd14c0

  • SHA512

    75e4e2cc2d9c619d246efc35d0185b0861b0ee4835be56c7253f360ed02e6295178e3a1ff4b8ea666503710869bee883dd17837534aaa646abd57d5b71864fdd

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTFBEa26:T6a+rdOOtEvwDpjND

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 44358bbd59a7feb58ae9ffc66250732b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections