General

  • Target

    4c44c4975089bad7eaf131ec2fbee4b9_cryptolocker_JC.exe

  • Size

    64KB

  • MD5

    4c44c4975089bad7eaf131ec2fbee4b9

  • SHA1

    f593096a8e2c4c558a67d2c157f592de2bf42601

  • SHA256

    1900a7ce229b98597cc37b01344324ec8f5729f7e403d229bf3e754da9eb62d9

  • SHA512

    489542b677a155403ae98dc2675f6fbb31574b865cb3f3082c45aecccf439ba46c250df23abed5525da72ca321ec24969a6134dcefc173869e6f74a8f9cbac14

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+goQum/kLyMro2GtOOtEvwDpjh:T6QFElP6n+goNmddpMOtEvwDpj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4c44c4975089bad7eaf131ec2fbee4b9_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections