General

  • Target

    96d2e1bc5de48a518e0cf7a01db47231_cryptolocker_JC.exe

  • Size

    71KB

  • MD5

    96d2e1bc5de48a518e0cf7a01db47231

  • SHA1

    84fd697e72aab98b15732e82bff717ff58a7b40d

  • SHA256

    f81ad96288d0e3303762997dba26b85670b99bb1b98c3ea54845b025a82db8d9

  • SHA512

    49506fb40f9b80a6e06a101b135298648da101ac4df8c43f1f3173cda062a0f4044269c84e0ca6f4b9b9774d4a167905c342403ae5180b787949b8465f6c82e2

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+z:T6a+rdOOtEvwDpjNN

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 96d2e1bc5de48a518e0cf7a01db47231_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections