General

  • Target

    4f8674b8974a9417c227e209760e4551_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    4f8674b8974a9417c227e209760e4551

  • SHA1

    39d8e07251d8399c34d063cbc232f2f41705166b

  • SHA256

    b5aba16cc46e8ec337e32a365bfb079ac5e73c964af824136ac4b2a82dcdebfc

  • SHA512

    c4a49636dfaee37ed37ee05236b85951f153c37d76bca6097b420981eb9a1d9299acc77df6f12eb58f78a85d8736fad0e2d74893f7bcb4fc4c0f0b413fa2a1ec

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTB:T6a+rdOOtEvwDpjNh

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4f8674b8974a9417c227e209760e4551_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections