General

  • Target

    a14b3a56beb2a7088d5c7133ef30d317_cryptolocker_JC.exe

  • Size

    79KB

  • MD5

    a14b3a56beb2a7088d5c7133ef30d317

  • SHA1

    d6ac66a5a3c7fa6521e1463b2c80a3a216d079a2

  • SHA256

    bd56d1d6f00a3c431d9bd98ead7569acb1049f3cb799f4c75be6da49a1f8c4c3

  • SHA512

    79ebc991c1f83fb3803ec4b7b752dddb5e30c6a2f4d11bf0e688b4d1b7a8fa20dbd9e4e7392d8b9ddea14b489d8f8d172a20601feb635dc102fb37d1240c004f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUXQaOKXz:T6a+rdOOtEvwDpjNQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a14b3a56beb2a7088d5c7133ef30d317_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections