General

  • Target

    562321f8423bd422d645677e65e66c13_cryptolocker_JC.exe

  • Size

    118KB

  • MD5

    562321f8423bd422d645677e65e66c13

  • SHA1

    9fc08d78a7acad15e4a9248736f14b30b1b7c221

  • SHA256

    ab3fe8702025c3fd6a181694d5df6b045c4db4d0c2b535e8f20c4fecc2bee65a

  • SHA512

    901317492db9af58632ed91e7904d9380d1b4eb2900ecc03e621b4697570c5b0bbcc0604d4865e3e1d8f20ce41466b3207a273793a9167db590fb80a768d6748

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgpQbCJjW:z6a+CdOOtEvwDpjczJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 562321f8423bd422d645677e65e66c13_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections