General

  • Target

    4b2286c42331b41606e69216c125f1be_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    4b2286c42331b41606e69216c125f1be

  • SHA1

    7d3a953ba0f32affd6c66b2c42bd8e6a3223c54e

  • SHA256

    94e30db08470ade90fef0a1785a38d8a091f7f4b9e07871fb5afe6a1d0772324

  • SHA512

    479c523c662c5a3d4f50e3f7e37a0fd724674c09a36d56c396a727fbf4c81347965f8113caae4c0b2673ff58b06683edec9e8602fd53255c277f3fcf15e997fb

  • SSDEEP

    768:qgmnjO6LsoEEeegiZPvEhHSG+gojum/kLyMro2GtOOtEvwDpj:qgmnK6QFElP6n+go6mddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4b2286c42331b41606e69216c125f1be_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections