General

  • Target

    952fbde82b3c4ce42d2b8843a861c82f_cryptolocker_JC.exe

  • Size

    56KB

  • MD5

    952fbde82b3c4ce42d2b8843a861c82f

  • SHA1

    420c6efd92891ef226b25183be6801bc42a4debd

  • SHA256

    96e2512c749779fefcbe7202c3eadaf1de5ed43464c4b43f8384d66f26166922

  • SHA512

    4031835f843bd090f367aaf854dabb16193fd474ba0bbc5e71b0f22379b3939311a00a790a54c18a21e835f1fc468345fe6a15c57fdc2b9dbf67fc5ff172b870

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLaBZoir4KtdO1:T6QFElP6n+gxmddpMOtEvwDpjwa3Ttm

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 952fbde82b3c4ce42d2b8843a861c82f_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections