General

  • Target

    920f911892cc66094f4e6183d6bfd183_cryptolocker_JC.exe

  • Size

    87KB

  • MD5

    920f911892cc66094f4e6183d6bfd183

  • SHA1

    dbd6ed8cf8645787cb0169f31710b24a4a3661f1

  • SHA256

    345543434c525f3a7e1efdf63b8f9e6086d51348b5b883dfd9f3cba2b167c826

  • SHA512

    96694f9bd201ef37da251fef54c4b0b05cda4b29d0a0538c5ccb43e58f0552e96eace3b16ee3aacc7aa936a6312f0c52a41cc6e00f594725026886a65eaa6689

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDj9:zCsanOtEvwDpjw

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 920f911892cc66094f4e6183d6bfd183_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections