General

  • Target

    4e6b67d20adfeab9be84bb9a9ed4fd4b_cryptolocker_JC.exe

  • Size

    134KB

  • MD5

    4e6b67d20adfeab9be84bb9a9ed4fd4b

  • SHA1

    d72ba4690b427bbef57ffa45cfff95238012faad

  • SHA256

    1441715c174155b307e126eae47e644ff3a6bffb51edd6e6bad18423cbe494fb

  • SHA512

    a1f5816fa2ef39ebad596537f38fb305450c8057800723e8615762952d74480502db6a871fb9f970e9a090d7761026ec6934feff03a7a7030fea4194bad9f77c

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G/Tu:z6a+CdOOtEvwDpjczH

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4e6b67d20adfeab9be84bb9a9ed4fd4b_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections