General

  • Target

    937b16b031815a8f3bad2b9194cffd75_cryptolocker_JC.exe

  • Size

    85KB

  • MD5

    937b16b031815a8f3bad2b9194cffd75

  • SHA1

    44906e68e99d410bec3ae093358859a6eeb622d1

  • SHA256

    5217e7a12838e01616171d998c9489a0a3e2b3d9f253b4d3cc6b8cc99a5af2e9

  • SHA512

    c1812172b5bab9f5d6d414b33b766b5c59d2072a056257842855cdb21654691f3ef484fe33be5e25b9057b570fdcef6e28b6771c718a02bf068f40e1bae77ab3

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDGcx:zCsanOtEvwDpjk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 937b16b031815a8f3bad2b9194cffd75_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections