General

  • Target

    4a3e45ac9e4ff2acda8920597f8e10ba_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    4a3e45ac9e4ff2acda8920597f8e10ba

  • SHA1

    a70449cb9a39a8fcfd6ab0fd78ce90c149d1af93

  • SHA256

    f922d63299a78ab9c5209d5b47aceaf4e56c7ad2d9d01d8821df9259570910f3

  • SHA512

    178a848da76e7d3ea036a1b842af7cb01a9877cabe2c362268d0492a23ba8d1a68a7ab6e8a612ecde0213877355db76ab37d69ff3c279a8bf8518f80763b7e0e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwa/hvucmw:T6a+rdOOtEvwDpjNB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4a3e45ac9e4ff2acda8920597f8e10ba_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections