General

  • Target

    4d2cd5d1f2f59209e2e1de6d80628697_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    4d2cd5d1f2f59209e2e1de6d80628697

  • SHA1

    b9d303ab99e68bbc499b5a0248fceadb055a3e64

  • SHA256

    966d109bbec206d8b7c49088379820852ab1534c6e6078b6f8fd20bbcd9290f3

  • SHA512

    2f76ecf1b3dca33c7c420314197585e0766c6a527c789b1cf18046835ef60d8fbd696d015d0cd7ae387f5259f63ad2dadeb22f5122de04ba62be567ca6fbab0c

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTOOZs3u:T6a+rdOOtEvwDpjNL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4d2cd5d1f2f59209e2e1de6d80628697_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections