General

  • Target

    4efd4e06022db8f8325a76d164f57b96_cryptolocker_JC.exe

  • Size

    65KB

  • MD5

    4efd4e06022db8f8325a76d164f57b96

  • SHA1

    9f5ee3effb834f498d68d4c02b4570a9448a18cc

  • SHA256

    b5288406f6fb40182a56182dbcab5456fed28b00dcfcb2182a7ebca5d9a1d5da

  • SHA512

    f299a3591c0acae0686c2eeaaa964f2b08a098c77e04eceb10417b42ef46f63852a3025d675820531aae30a1d01a7dd16b6b83857b3bd513d3b9c7d91fd9804c

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYfKhBUzMo:1nK6a+qdOOtEvwDpj2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4efd4e06022db8f8325a76d164f57b96_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections