General

  • Target

    4fea4de892a354f26da6271b37366bd1_cryptolocker_JC.exe

  • Size

    76KB

  • MD5

    4fea4de892a354f26da6271b37366bd1

  • SHA1

    b1686e3a79cd98151dd54a3707fb9408e54136eb

  • SHA256

    75c4f473f98d00266c3b64e8672e50b036ee564beddaed601678456ea17d901e

  • SHA512

    91b677e66b30b28956ed0698c99da323a5a73ce0b8e40f1402c931491ac44a52a0150fec646741843734844534dd29b1dacf9816e8b1b2c7c5bc7143d0314184

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUk:1nK6a+qdOOtEvwDpjv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4fea4de892a354f26da6271b37366bd1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections