General

  • Target

    46b335313ffe58dd461ddba04ccc7aa9_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    46b335313ffe58dd461ddba04ccc7aa9

  • SHA1

    f393a66fc413919c680c949ab06df65be4ad2bd6

  • SHA256

    31c5710baf3bfecb5cc658058adcfabcc9def3d78e4f2d298fdb254d41dc091e

  • SHA512

    a4756a06eb3f0e266e5a123d3ef351632b3b0fb6b5058c27c243fc4b61d5bdf4977ea655a68a3b85de30ea6b39d93acad7527cfeac5768ff613f07c4c0285433

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwa/hvuml:T6a+rdOOtEvwDpjNF

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 46b335313ffe58dd461ddba04ccc7aa9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections