General

  • Target

    4ea04624ad05f00491c34cb9864942cb_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    4ea04624ad05f00491c34cb9864942cb

  • SHA1

    df6766283d8d622c0aa03e3c449a33e6ec7944f2

  • SHA256

    e91b3740410830ded184544746371c82f63e6a8757e789b7d40a15f9de43c2bb

  • SHA512

    24b9721b2cdcbaf0f064ee03263be0cec032681bdda9c0c7760bd8e6e49bf283328b2d145e38c10fdb395b4addfdd686619b12e6e196d018d590d98b4b80f0b6

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1eG:z6a+CdOOtEvwDpjczw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4ea04624ad05f00491c34cb9864942cb_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections