General

  • Target

    58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    58026446c1664995c090482fb8c742ac

  • SHA1

    54294b021b1b85421db4c79ece422b60f64c5b74

  • SHA256

    cb3d893b6c54f70979be4a2c75c2fa82b5a5bea0e4cc6aeb69ddd8bc66f0fde8

  • SHA512

    406caf01152ce04bed34d40ac2d5479b2a08e03c3b183591df1301e6068bda67c3c511abc456ceb7765ea3d2bb82d6e887dff70c37a93d2179a111c92f7d1503

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRD+A:zCsanOtEvwDpjU

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 58026446c1664995c090482fb8c742ac_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections