General

  • Target

    4b3ca87469fb3ceea41bdebce3700222_cryptolocker_JC.exe

  • Size

    83KB

  • MD5

    4b3ca87469fb3ceea41bdebce3700222

  • SHA1

    359f50b635b34bb0ed4bc7c020300b866163ee93

  • SHA256

    87022ac646f7de9ed61abeb97d5f02d0ebb427f7c1d891fc06b5169e13b8b5b4

  • SHA512

    4900389b0ec4f268aeb1425c0c1872207f2a0e9bd3544211a3d4305b36caaf6ad9d1d2fc32f21de6afd1434ca03ceb941e4fbf3dc65dc7ea673d15dd6dc9c41e

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTFBEaB2:T6a+rdOOtEvwDpjNe

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4b3ca87469fb3ceea41bdebce3700222_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections