General

  • Target

    956bf54c158d1db4e45e2e623431ca37_cryptolocker_JC.exe

  • Size

    138KB

  • MD5

    956bf54c158d1db4e45e2e623431ca37

  • SHA1

    cb21c65896b22ac4ef0b2590d15aee0e86ffb616

  • SHA256

    2e430b579f091782b605225c1ba6a1531fa7c6f9fbd523e3211f36da697cdcfc

  • SHA512

    b7a543ef3f6539e51ca79eed02149b297df011a1520a294df8d4d90496fdc28aa6b0e75ea76603b8fce7872efb05a58d208e5e57852d7e6d7b95b327b972d75d

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp699GNtL1ep:z6a+CdOOtEvwDpjczj

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 956bf54c158d1db4e45e2e623431ca37_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections