General

  • Target

    a16f19908ffecfb13f600d2491a8a90a_cryptolocker_JC.exe

  • Size

    98KB

  • MD5

    a16f19908ffecfb13f600d2491a8a90a

  • SHA1

    aced9edcf35a29520ee688d74b6bfdc3bc7b5a77

  • SHA256

    c010e5907dfb7430f293b088d820226795da3ac3ed214101a2abc0ab50d83821

  • SHA512

    a40ebcf8e3ae444ae81f7edbf6bc12894d95609be27ec290aa2a6a08feef022eba29195497e949594408839141df93662f18629136c3ab0c265ea0b0f9a23dfa

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gk3:1nK6a+qdOOtEvwDpjk

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a16f19908ffecfb13f600d2491a8a90a_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections