General

  • Target

    654a78f39475999587d94ef74ad16020_cryptolocker_JC.exe

  • Size

    137KB

  • MD5

    654a78f39475999587d94ef74ad16020

  • SHA1

    b4aea8578bd018aa4c3319b63d246a7192ad89e7

  • SHA256

    aea9ffe611fa6c00ebaa986bf0e2016be4511ca34a6d2760bec15bdf2414d75c

  • SHA512

    262f794b3c6d773967aa81e4de5826a3e92368c9b876ad2a6c88f235e4be188445181db40321e6bee019e0df1083065e27972aeb26ae37505dedf75ab32a1976

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1yG:z6a+CdOOtEvwDpjczrG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 654a78f39475999587d94ef74ad16020_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections