General

  • Target

    49ddf5d09ba20d0b87c704f5288f4bbf_cryptolocker_JC.exe

  • Size

    93KB

  • MD5

    49ddf5d09ba20d0b87c704f5288f4bbf

  • SHA1

    f2441264b48437cf40c93211fa6cd23a30486ef5

  • SHA256

    020ca936ce51b1c4b286fecd6b1be047be7c91d55d766159605dc8079060da86

  • SHA512

    8e9f1d75da8bdba403a2148c0970765bccd4914ba86f2e52e25b5dc034bdebfa5e6752e178a7d0f541dbc76a8c92fc9d558c21723157b33fe188c1c2586b2bee

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bj:z6a+CdOOtEvwDpjcB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 49ddf5d09ba20d0b87c704f5288f4bbf_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections