General

  • Target

    4af47019572968f94b754897b24a7fba_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    4af47019572968f94b754897b24a7fba

  • SHA1

    f70b2f35b5ede425f6260e72fcd300ea9a04c4c0

  • SHA256

    4028a330e727acf72264b8fbb255146b414ecca4a227166c817fbaf93dfbde0a

  • SHA512

    b0bdb03d03a3c4e17a2f0cccc1b53d61915b7ab51b0a2c3223b1419d9b65875f2d970971309124c934e262fbff8dad6102fde45641a6e0a5fdb50e440bfb69da

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+goOum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+gonmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4af47019572968f94b754897b24a7fba_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections