General

  • Target

    4d4f5bf194a0a3551e6a865f11442b6c_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    4d4f5bf194a0a3551e6a865f11442b6c

  • SHA1

    522099c723d929802f94b94f13ce0e018ac57d7c

  • SHA256

    b423272623924069bfe292f118643151dcf17a90f7b781bf90c5a0f71d8b45ec

  • SHA512

    a4146680f451c527cefda7436f373480b9d2e1f7930f0c67862e3c96d3869d701c82c2ab72b4320c8a1cd1c0a994568283c28a0c621ff634af1bfe2eca09381c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjK:z6a+CdOOtEvwDpjczd

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4d4f5bf194a0a3551e6a865f11442b6c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections