General

  • Target

    91a4d342be3262806a21b4f9abf7c251_cryptolocker_JC.exe

  • Size

    60KB

  • MD5

    91a4d342be3262806a21b4f9abf7c251

  • SHA1

    24e95c6520336a52847bd15e05e8be9ba748e3c4

  • SHA256

    8e19a9dda9f9ffd35533b337f6a004f43b84c1621c78d1ec80f6ec1dd5e89663

  • SHA512

    26a000bc120d48e7f864dc289a7fe4055be3c172c4359f1f89e66b0600b7111a1b3e7e9aad5bf34215e479b02e3cd77086da344c3ea200257c12ce12eca9d4fc

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAlmP:z6a+CdOOtEvwDpjQB

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 91a4d342be3262806a21b4f9abf7c251_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections