General

  • Target

    534461126c9a3547b6b64c3e958c1583_cryptolocker_JC.exe

  • Size

    78KB

  • MD5

    534461126c9a3547b6b64c3e958c1583

  • SHA1

    a877d93ad55c8f3e277f66b95f58b58228d3b99b

  • SHA256

    22d325d9d6a1181de0acbb747167b2680ba58d00fe3ad48323bc0ce9367ab899

  • SHA512

    3bc26110ff36fbab3ea9d3464772f36cfac22c8f609db038cfdc443877b57460b245bbf9c7b34c0c23c1de4164eabf2a951ea71b67de4e62f77c891f470a49f7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKTOw:T6a+rdOOtEvwDpjNm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 534461126c9a3547b6b64c3e958c1583_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections