General

  • Target

    4f2ef5ebedb216467d833a55cb0ed621_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    4f2ef5ebedb216467d833a55cb0ed621

  • SHA1

    9b91f4ddd751a700d2b25b7d3a54b7f3a7413105

  • SHA256

    a98f2b63affd8bc205f5ad616a227b49f38545683de3e762b263d5dbd3c595ea

  • SHA512

    3c99fe1782ba3a9fc70d571a971ad16c798b4a0ff2315067d2c5b8f0607d52db5172674f351e169a268fa7439cb796713ea9eb8b447363138f5b97929256e948

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQb6r:z6a+CdOOtEvwDpjczu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f2ef5ebedb216467d833a55cb0ed621_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections