General

  • Target

    74b7ba56b3487fbd2b9b495d8bb3fd45_cryptolocker_JC.exe

  • Size

    82KB

  • MD5

    74b7ba56b3487fbd2b9b495d8bb3fd45

  • SHA1

    1d5c9f8be6280b899b1fe4c44a0a1c06d9ce66b9

  • SHA256

    a886246610f887e44b831db72c69cfca354797d1068cd351e03265c6988dd831

  • SHA512

    1af6dcc35637b95fd0c8a5b7dd9b251d1a67ef30c2cdc2fca794a6596e4192f439db9e27d818acd10ea8badfd2bab81ecb16725ad2dfebe79b5a3c68fe1a899d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOTFBEa22:T6a+rdOOtEvwDpjNv

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 74b7ba56b3487fbd2b9b495d8bb3fd45_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections