General

  • Target

    584ab8960897556a315925dba8119e95_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    584ab8960897556a315925dba8119e95

  • SHA1

    2a71c5aad78e145548aa5e1aa270a751b6c2512e

  • SHA256

    b731004ca66e723d3dc48db700684e13bae5d349cf721e350b8b1274a454ef9c

  • SHA512

    7d05c4485091870d74d4191233049e778028fb7b62d9ae9ed8d6c73d2d979bce0fc18ccb5f7dae9b6d244fe0ef032f170c56d30b88453795832be2c19694fe1b

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKXl:T6a+rdOOtEvwDpjNS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 584ab8960897556a315925dba8119e95_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections