General

  • Target

    4f18e5c86b6b8b783ac7864e17b3ca78_cryptolocker_JC.exe

  • Size

    77KB

  • MD5

    4f18e5c86b6b8b783ac7864e17b3ca78

  • SHA1

    3c86a99836c6fe8a403ff69dab9d9c899a07bb40

  • SHA256

    ae21a8d953673a3eff8bfb571271c6f418c7dcea8406a301cf0d685e4eaad614

  • SHA512

    a871ada2490bb7cb08ca4ef24d35eb2fe0a0f43729222cedcab4454ee210b3bd02aa249e2debf4a9cf0e34e62b5f2449c2639d9d5fd7697eecf775d1a5b4a868

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSwLJE:1nK6a+qdOOtEvwDpjR

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f18e5c86b6b8b783ac7864e17b3ca78_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections