General

  • Target

    4f67cccbbfb86cea474a895d1a832134_cryptolocker_JC.exe

  • Size

    70KB

  • MD5

    4f67cccbbfb86cea474a895d1a832134

  • SHA1

    1f9148ec16d327ffc093275a44d67417ed694076

  • SHA256

    0443eef72628556147afd7455846778fd799df31197d65f1863cec0d0c50c4d6

  • SHA512

    b591ebb01a7246f337d01297dc16afd7f76fe59668657837671f19d8cc8913e66c96ac00de83032713bfe572a1256b7ae590dd8870f0845a217029d6333568d7

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YS5+:T6a+rdOOtEvwDpjN2

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f67cccbbfb86cea474a895d1a832134_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections