General

  • Target

    937ad562d328e96cd0b2928a43794bd1_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    937ad562d328e96cd0b2928a43794bd1

  • SHA1

    c2cbd9c402fb4a61dade660d8fd40be37f80bfa7

  • SHA256

    c1ed9a30c92e18e881f4a08de99e511b7c490066f1c16d3c1fbdcb30d83145dc

  • SHA512

    dac6dd8321868746a7530e1bf9b5a4f44497d66ad02d7428160ca19f73516d621eb7df4afe3c215e9697b44ac06f5f1f531e13f5dd6c819841196d240203f587

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699G1L6B:z6a+CdOOtEvwDpjczx

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 937ad562d328e96cd0b2928a43794bd1_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections