General

  • Target

    4d93eb94fb8ae4a448c173c449d76236_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    4d93eb94fb8ae4a448c173c449d76236

  • SHA1

    9d87cf9c4e394d9e22e755514020b39735bde2d4

  • SHA256

    5748228f84ee069c42c8cfae7dd869751aefb9fceea5df8b2177e8625cd440f7

  • SHA512

    9a31c806f4bb8541161303c007f780a0745d614cdb37b6407036e16302d5f37894066efae2df2a9f69a2afbd0f8664b30f2209616eaee3d87167803e3bd874d3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9y+:zCsanOtEvwDpje

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4d93eb94fb8ae4a448c173c449d76236_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections