General

  • Target

    4749e3bb87a050686713564aa0cd7416_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    4749e3bb87a050686713564aa0cd7416

  • SHA1

    b7735e9ad54a24677e36cf0512fcbc13b8fa84cc

  • SHA256

    9aefc6305c836cdc37e07cabd6cdf645fa9d2d2f405133a696e534acc9080d1e

  • SHA512

    5a6a56b8e2a8f9d92c238d375a663e7e926c64c300f23a346223b7571151d22a270fea70a37b45c01664753758c9ce6b45b5dbb239e91de767f6432fe0b6032e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjH:z6a+CdOOtEvwDpjczs

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4749e3bb87a050686713564aa0cd7416_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections