General

  • Target

    4a45d3cddd7dbcb85a5b9ffeb9fd7140_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    4a45d3cddd7dbcb85a5b9ffeb9fd7140

  • SHA1

    d230da197419efbda70fba74a0faf0072861ab39

  • SHA256

    aef08093a76f76028699c2296d438b67ba9a7a27bd2be49caa82aff0c252c226

  • SHA512

    db4fbde50e708ec24523c03261ec9ff215d066007c803ced92d9c8bfd3b4e0ec2c72726df6111df54f6d86de3184a95a7b0c50c9a3ea81bbf82b005117238ff9

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gZ/Mum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gZ/ZmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4a45d3cddd7dbcb85a5b9ffeb9fd7140_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections