General

  • Target

    4fd80ed9623422dc7e961a4da4692827_cryptolocker_JC.exe

  • Size

    57KB

  • MD5

    4fd80ed9623422dc7e961a4da4692827

  • SHA1

    e0d9ffd42d5d454dcbadde1f35dceddb6261c434

  • SHA256

    e5a63c944012cb2c0a4db81fb5cc5c7beba9552d8ec9abbc756c8e88a1f737d7

  • SHA512

    5a2e36d2ea1d77aa4df731a496a4426213594840a8ddad3c44e59c59b2525f1a37a8a8419f09a40ba101d169916d69e3bfd37318fd516c996f23e84f386e1765

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelagPXPECuMuE0XH5:zj+soPSMOtEvwDpj4HE9MWZ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4fd80ed9623422dc7e961a4da4692827_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections